<mediawiki xmlns="http://www.mediawiki.org/xml/export-0.11/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.mediawiki.org/xml/export-0.11/ http://www.mediawiki.org/xml/export-0.11.xsd" version="0.11" xml:lang="en">
  <siteinfo>
    <sitename>Whonix</sitename>
    <dbname>wiki</dbname>
    <base>https://www.whonix.org/wiki/About</base>
    <generator>MediaWiki 1.44.3</generator>
    <case>first-letter</case>
    <namespaces>
      <namespace key="-2" case="first-letter">Media</namespace>
      <namespace key="-1" case="first-letter">Special</namespace>
      <namespace key="0" case="first-letter" />
      <namespace key="1" case="first-letter">Talk</namespace>
      <namespace key="2" case="first-letter">User</namespace>
      <namespace key="3" case="first-letter">User talk</namespace>
      <namespace key="4" case="first-letter">Whonix</namespace>
      <namespace key="5" case="first-letter">Whonix talk</namespace>
      <namespace key="6" case="first-letter">File</namespace>
      <namespace key="7" case="first-letter">File talk</namespace>
      <namespace key="8" case="first-letter">MediaWiki</namespace>
      <namespace key="9" case="first-letter">MediaWiki talk</namespace>
      <namespace key="10" case="first-letter">Template</namespace>
      <namespace key="11" case="first-letter">Template talk</namespace>
      <namespace key="12" case="first-letter">Help</namespace>
      <namespace key="13" case="first-letter">Help talk</namespace>
      <namespace key="14" case="first-letter">Category</namespace>
      <namespace key="15" case="first-letter">Category talk</namespace>
      <namespace key="274" case="first-letter">Widget</namespace>
      <namespace key="275" case="first-letter">Widget talk</namespace>
      <namespace key="500" case="first-letter">Moved</namespace>
      <namespace key="828" case="first-letter">Module</namespace>
      <namespace key="829" case="first-letter">Module talk</namespace>
    </namespaces>
  </siteinfo>
  <page>
    <title>MediaWiki:Sidebar</title>
    <ns>8</ns>
    <id>3</id>
    <revision>
      <id>7</id>
      <timestamp>2013-06-18T18:44:57Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>Created page with " * users ** homepage|homepage ** News|News ** Screenshots|Screenshots ** Videos ** Download ** Documentation ** About ** Features ** Security Guide ** FAQ ** Forum ** Contact ..."</comment>
      <origin>7</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="577" sha1="gjuyztx7q99mibud1hj8f9ke5i80jb1" xml:space="preserve">
* users
** homepage|homepage
** News|News
** Screenshots|Screenshots
** Videos
** Download
** Documentation
** About
** Features
** Security Guide
** FAQ
** Forum
** Contact

* Frequently Asked Features
** Bridges Support
** VPN/Tunnel Support
** Location/IP Hidden Servers
** Windows Support
** Flash Support
** You Can Help

* Developers
** Contribiute
** Techical Design
** Source Code / Hacking / Development Tickets
** Changelog
** Authorship
** Disclaimer

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>gjuyztx7q99mibud1hj8f9ke5i80jb1</sha1>
    </revision>
    <revision>
      <id>8</id>
      <parentid>7</parentid>
      <timestamp>2013-06-18T18:49:06Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>8</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="842" sha1="t7di4w9vufzw3wp0fsxh5wop2k9967y" xml:space="preserve">
* users
** Homepage|Homepage
** News|News
** Screenshots|Screenshots
** Videos|Videos
** Download|Download
** Documentation|Documentation
** About|About
** Features|Features
** Security Guide|Security Guide
** FAQ|FAQ
** Forum|Forum
** You Can Help|Contribute
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges Support|Bridges
** VPN/Tunnel Support|Features/#vpn-tunnel-support
** Location/IP Hidden Servers|HostingLocationHiddenServices
** Windows Support|OtherOperatingSystems
** Flash Support|BrowserPlugins

* Developers
** Contribute|Contribute
** Techical Design|Design
** Source Code / Hacking / Development Tickets|Dev/SourceCode
** Changelog|Dev/Changelog
** Authorship|Dev/Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>t7di4w9vufzw3wp0fsxh5wop2k9967y</sha1>
    </revision>
    <revision>
      <id>9</id>
      <parentid>8</parentid>
      <timestamp>2013-06-18T18:51:05Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>9</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="843" sha1="q2jdztewljoh41sslvpokasmmyi8q23" xml:space="preserve">
* users
** Homepage|Homepage
** News|News
** Screenshots|Screenshots
** Videos|Videos
** Download|Download
** Documentation|Documentation
** About|About
** Features|Features
** SecurityGuide|Security Guide
** FAQ|FAQ
** Forum|Forum
** Contribute|You Can Help
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features/#vpn-tunnel-support|VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** OtherOperatingSystems|Windows Support
** BrowserPlugins|Flash Support

* Developers
** Contribute|Contribute
** Design|Technical Design
** Dev/SourceCode|Source Code / Hacking / Development Tickets
** Dev/Changelog|Changelog|
** Dev/Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>q2jdztewljoh41sslvpokasmmyi8q23</sha1>
    </revision>
    <revision>
      <id>10</id>
      <parentid>9</parentid>
      <timestamp>2013-06-18T18:51:48Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>10</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="845" sha1="36iu5s72rkumu4i4atv1ndhw0hvu4bt" xml:space="preserve">
* users
** Homepage|Homepage
** News|News
** Screenshots|Screenshots
** Videos|Videos

** Download|Download

** Documentation|Documentation
** About|About
** Features|Features
** SecurityGuide|Security Guide
** FAQ|FAQ
** Forum|Forum
** Contribute|You Can Help
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features/#vpn-tunnel-support|VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** OtherOperatingSystems|Windows Support
** BrowserPlugins|Flash Support

* Developers
** Contribute|Contribute
** Design|Technical Design
** Dev/SourceCode|Source Code / Hacking / Development Tickets
** Dev/Changelog|Changelog|
** Dev/Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>36iu5s72rkumu4i4atv1ndhw0hvu4bt</sha1>
    </revision>
    <revision>
      <id>11</id>
      <parentid>10</parentid>
      <timestamp>2013-06-18T18:53:35Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>11</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="842" sha1="57iuaojs49zy75ea6qyjpdca2qsf0zk" xml:space="preserve">
* users
** Homepage|Homepage
** About|About
** Features|Features
** Download|Download
** Documentation|Documentation
** News|News
** Screenshots|Screenshots
** Videos|Videos
** SecurityGuide|Security Guide
** FAQ|FAQ
** Forum|Forum
** Contribute|You Can Help
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features/#vpn-tunnel-support|VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** OtherOperatingSystems|Windows Support
** BrowserPlugins|Flash Support

* Developers
** Contribute|Contribute
** Design|Technical Design
** Dev/SourceCode|Source Code / Hacking / Development Tickets
** Dev/Changelog|Changelog
** Dev/Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>57iuaojs49zy75ea6qyjpdca2qsf0zk</sha1>
    </revision>
    <revision>
      <id>12</id>
      <parentid>11</parentid>
      <timestamp>2013-06-18T18:54:06Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>12</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="843" sha1="bqczdfrw93zqooelizqa2rv0sj8b4ca" xml:space="preserve">
* users
** Homepage|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** News|News
** Screenshots|Screenshots
** Videos|Videos
** SecurityGuide|Security Guide
** FAQ|FAQ
** Forum|Forum
** Contribute|You Can Help
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features/#vpn-tunnel-support|VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** OtherOperatingSystems|Windows Support
** BrowserPlugins|Flash Support

* Developers
** Contribute|Contribute
** Design|Technical Design
** Dev/SourceCode|Source Code / Hacking / Development Tickets
** Dev/Changelog|Changelog
** Dev/Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>bqczdfrw93zqooelizqa2rv0sj8b4ca</sha1>
    </revision>
    <revision>
      <id>13</id>
      <parentid>12</parentid>
      <timestamp>2013-06-18T18:56:21Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>13</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="928" sha1="5nlo0e3mpye4chwmpbqtar5el4hwdr6" xml:space="preserve">
* users
** Homepage|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** News|News
** Screenshots|Screenshots
** Videos|Videos
** SecurityGuide|Security Guide
** FAQ|FAQ
** Forum|Forum
** Contribute|You Can Help
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features/#vpn-tunnel-support|VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** OtherOperatingSystems|Windows Support
** BrowserPlugins|Flash Support

* Developers
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** x|Hacking
** x|Developer Portal
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Dev/Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>5nlo0e3mpye4chwmpbqtar5el4hwdr6</sha1>
    </revision>
    <revision>
      <id>14</id>
      <parentid>13</parentid>
      <timestamp>2013-06-18T18:58:15Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>14</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1102" sha1="g0alir6cofe0uqu6k94lbk0ycuiti4u" xml:space="preserve">
* users
** Homepage|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** News|News
** Screenshots|Screenshots
** Videos|Videos
** SecurityGuide|Security Guide
** FAQ|FAQ
** Forum|Forum
** Contribute|You Can Help
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features/#vpn-tunnel-support|VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** OtherOperatingSystems|Windows Support
** BrowserPlugins|Flash Support

* Developers
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** x|Hacking
** x|Developer Portal
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Dev/Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>g0alir6cofe0uqu6k94lbk0ycuiti4u</sha1>
    </revision>
    <revision>
      <id>78</id>
      <parentid>14</parentid>
      <timestamp>2013-06-27T16:26:29Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>78</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1139" sha1="3cighrbqrafkeaiuz5xiyxwnzn7nf4z" xml:space="preserve">
* users
** Homepage|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** News|News
** Screenshots|Screenshots
** Videos|Videos
** SecurityGuide|Security Guide
** FAQ|FAQ
** http://sourceforge.net/p/whonix/discussion|Forum
** Contribute|You Can Help
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features/#vpn-tunnel-support|VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** OtherOperatingSystems|Windows Support
** BrowserPlugins|Flash Support

* Developers
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** x|Hacking
** x|Developer Portal
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Dev/Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>3cighrbqrafkeaiuz5xiyxwnzn7nf4z</sha1>
    </revision>
    <revision>
      <id>81</id>
      <parentid>78</parentid>
      <timestamp>2013-06-27T16:31:40Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>81</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1138" sha1="kssqvxak36nofpxald8z13s39cb2squ" xml:space="preserve">
* users
** Homepage|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** News|News
** Screenshots|Screenshots
** Videos|Videos
** SecurityGuide|Security Guide
** FAQ|FAQ
** http://sourceforge.net/p/whonix/discussion|Forum
** Contribute|You Can Help
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#vpn-tunnel-support|VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** OtherOperatingSystems|Windows Support
** BrowserPlugins|Flash Support

* Developers
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** x|Hacking
** x|Developer Portal
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Dev/Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>kssqvxak36nofpxald8z13s39cb2squ</sha1>
    </revision>
    <revision>
      <id>82</id>
      <parentid>81</parentid>
      <timestamp>2013-06-27T16:35:03Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>82</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1141" sha1="a88qlk6vmr29gj9hfd24gtr092lmpl1" xml:space="preserve">
* users
** Homepage|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** News|News
** Screenshots|Screenshots
** Videos|Videos
** SecurityGuide|Security Guide
** FAQ|FAQ
** http://sourceforge.net/p/whonix/discussion|Forum
** Contribute|You Can Help
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Featrues#VPN / Tunnel support |VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** OtherOperatingSystems|Windows Support
** BrowserPlugins|Flash Support

* Developers
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** x|Hacking
** x|Developer Portal
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Dev/Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>a88qlk6vmr29gj9hfd24gtr092lmpl1</sha1>
    </revision>
    <revision>
      <id>83</id>
      <parentid>82</parentid>
      <timestamp>2013-06-27T16:35:21Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>83</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1141" sha1="o2t6mi1ldbwc8pi7sal47chokxu0z17" xml:space="preserve">
* users
** Homepage|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** News|News
** Screenshots|Screenshots
** Videos|Videos
** SecurityGuide|Security Guide
** FAQ|FAQ
** http://sourceforge.net/p/whonix/discussion|Forum
** Contribute|You Can Help
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN / Tunnel support |VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** OtherOperatingSystems|Windows Support
** BrowserPlugins|Flash Support

* Developers
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** x|Hacking
** x|Developer Portal
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Dev/Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>o2t6mi1ldbwc8pi7sal47chokxu0z17</sha1>
    </revision>
    <revision>
      <id>167</id>
      <parentid>83</parentid>
      <timestamp>2013-07-01T16:55:36Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>167</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1287" sha1="hjnoxcnmueqzuqga1kwuo7sbgd8tolo" xml:space="preserve">
* users
** Homepage|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** News|News
** Screenshots|Screenshots
** Videos|Videos
** SecurityGuide|Security Guide
** FAQ|FAQ
** http://sourceforge.net/p/whonix/discussion|Forum
** Contribute|You Can Help
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** Mailing List|https://whonix.org/cgi-bin/mailman/listinfo/whonix-users
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN / Tunnel support |VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** OtherOperatingSystems|Windows Support
** BrowserPlugins|Flash Support

* Developers
** Mailing List|https://whonix.org/cgi-bin/mailman/listinfo/whonix-devel
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** x|Hacking
** x|Developer Portal
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Dev/Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>hjnoxcnmueqzuqga1kwuo7sbgd8tolo</sha1>
    </revision>
    <revision>
      <id>168</id>
      <parentid>167</parentid>
      <timestamp>2013-07-01T16:56:24Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>168</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1287" sha1="hb8sbbes0y1ibt8vpdshv3m4y4xtr3f" xml:space="preserve">
* users
** Homepage|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** News|News
** Screenshots|Screenshots
** Videos|Videos
** SecurityGuide|Security Guide
** FAQ|FAQ
** http://sourceforge.net/p/whonix/discussion|Forum
** Contribute|You Can Help
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-users|Mailing List
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN / Tunnel support |VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** OtherOperatingSystems|Windows Support
** BrowserPlugins|Flash Support

* Developers
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-devel|Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** x|Hacking
** x|Developer Portal
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Dev/Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>hb8sbbes0y1ibt8vpdshv3m4y4xtr3f</sha1>
    </revision>
    <revision>
      <id>170</id>
      <parentid>168</parentid>
      <timestamp>2013-07-01T17:14:02Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>170</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1288" sha1="hbv4zfao402uoalpeacyuvkiap6ydqa" xml:space="preserve">
* users
** Homepage|Main Page
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** News|News
** Screenshots|Screenshots
** Videos|Videos
** SecurityGuide|Security Guide
** FAQ|FAQ
** http://sourceforge.net/p/whonix/discussion|Forum
** Contribute|You Can Help
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-users|Mailing List
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN / Tunnel support |VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** OtherOperatingSystems|Windows Support
** BrowserPlugins|Flash Support

* Developers
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-devel|Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** x|Hacking
** x|Developer Portal
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Dev/Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>hbv4zfao402uoalpeacyuvkiap6ydqa</sha1>
    </revision>
    <revision>
      <id>171</id>
      <parentid>170</parentid>
      <timestamp>2013-07-01T17:14:33Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>171</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1288" sha1="1nr0elekdxbmvyt3e2e7j6kwrb1e8h2" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** News|News
** Screenshots|Screenshots
** Videos|Videos
** SecurityGuide|Security Guide
** FAQ|FAQ
** http://sourceforge.net/p/whonix/discussion|Forum
** Contribute|You Can Help
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-users|Mailing List
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN / Tunnel support |VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** OtherOperatingSystems|Windows Support
** BrowserPlugins|Flash Support

* Developers
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-devel|Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** x|Hacking
** x|Developer Portal
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Dev/Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>1nr0elekdxbmvyt3e2e7j6kwrb1e8h2</sha1>
    </revision>
    <revision>
      <id>367</id>
      <parentid>171</parentid>
      <timestamp>2013-07-04T00:24:49Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>367</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1460" sha1="mflbe6bwkcvqr472gr5nl54kj8ps988" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://anonymousoperatingsystem.wordpress.com/|News Blog
** Screenshots|Screenshots
** Videos|Videos
** SecurityGuide|Security Guide
** FAQ|FAQ
** http://sourceforge.net/p/whonix/discussion|Forum
** Contribute|You Can Help
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-users|Mailing List
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN / Tunnel support |VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** OtherOperatingSystems|Windows Support
** BrowserPlugins|Flash Support

* Danger Zone
** https://twitter.com/Whonix|@Whonix Twitter
** https://plus.google.com/108150429836421683225/about|Google+

* Developers
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-devel|Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** x|Hacking
** x|Developer Portal
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Dev/Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>mflbe6bwkcvqr472gr5nl54kj8ps988</sha1>
    </revision>
    <revision>
      <id>368</id>
      <parentid>367</parentid>
      <timestamp>2013-07-04T00:26:43Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>368</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1754" sha1="946soghwkeglvaac1gjy3dsr03h7225" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://anonymousoperatingsystem.wordpress.com/|News Blog
** Screenshots|Screenshots
** Videos|Videos
** SecurityGuide|Security Guide
** FAQ|FAQ
** http://sourceforge.net/p/whonix/discussion|Forum
** Contribute|You Can Help
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-users|Mailing List
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN / Tunnel support |VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** OtherOperatingSystems|Windows Support
** BrowserPlugins|Flash Support

* Danger Zone
** OnlineProfiles|Social Media Profiles|
** https://twitter.com/Whonix|@Whonix Twitter
** https://plus.google.com/108150429836421683225/about|Google+
** https://www.facebook.com/pages/Whonix/369240439779108|Facebook ([https://sourceforge.net/p/whonix/featureblog/2013/01/facebook-asking-for-government-issued-photo-id-ex-passport-drivers-license---whonix-facebook-account-permanently-blocked/ defunct])

* Developers
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-devel|Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** x|Hacking
** x|Developer Portal
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Dev/Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>946soghwkeglvaac1gjy3dsr03h7225</sha1>
    </revision>
    <revision>
      <id>369</id>
      <parentid>368</parentid>
      <timestamp>2013-07-04T00:27:45Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>369</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1522" sha1="55a55qtr46wmc4amsri0ymx02t2z4cf" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://anonymousoperatingsystem.wordpress.com/|News Blog
** Screenshots|Screenshots
** Videos|Videos
** SecurityGuide|Security Guide
** FAQ|FAQ
** http://sourceforge.net/p/whonix/discussion|Forum
** Contribute|You Can Help
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-users|Mailing List
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN / Tunnel support |VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** OtherOperatingSystems|Windows Support
** BrowserPlugins|Flash Support

* Danger Zone
** OnlineProfiles|Social Media Profiles|
** https://twitter.com/Whonix|@Whonix Twitter
** https://plus.google.com/108150429836421683225/about|Google+
** Facebook|Facebook

* Developers
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-devel|Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** x|Hacking
** x|Developer Portal
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Dev/Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>55a55qtr46wmc4amsri0ymx02t2z4cf</sha1>
    </revision>
    <revision>
      <id>371</id>
      <parentid>369</parentid>
      <timestamp>2013-07-04T00:30:51Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>371</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1521" sha1="nx8fjhrwxbn61xxay3cs1mflmhkl1xl" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://anonymousoperatingsystem.wordpress.com/|News Blog
** Screenshots|Screenshots
** Videos|Videos
** SecurityGuide|Security Guide
** FAQ|FAQ
** http://sourceforge.net/p/whonix/discussion|Forum
** Contribute|You Can Help
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-users|Mailing List
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN / Tunnel support |VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** OtherOperatingSystems|Windows Support
** BrowserPlugins|Flash Support

* Danger Zone
** OnlineProfiles|Social Media Profiles
** https://twitter.com/Whonix|@Whonix Twitter
** https://plus.google.com/108150429836421683225/about|Google+
** Facebook|Facebook

* Developers
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-devel|Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** x|Hacking
** x|Developer Portal
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Dev/Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>nx8fjhrwxbn61xxay3cs1mflmhkl1xl</sha1>
    </revision>
    <revision>
      <id>373</id>
      <parentid>371</parentid>
      <timestamp>2013-07-05T15:32:42Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>373</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1538" sha1="8i95n51k1snks5shpeto8lcx9trc6mr" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://anonymousoperatingsystem.wordpress.com/|News Blog
** Screenshots|Screenshots
** Videos|Videos
** SecurityGuide|Security Guide
** FAQ|FAQ
** http://sourceforge.net/p/whonix/discussion|Forum
** Contribute|You Can Help
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-users|User Mailing List
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN / Tunnel support |VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** OtherOperatingSystems|Windows Support
** BrowserPlugins|Flash Support

* Danger Zone
** OnlineProfiles|Social Media Profiles
** https://twitter.com/Whonix|@Whonix Twitter
** https://plus.google.com/108150429836421683225/about|Google+
** Facebook|Facebook

* Developers
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-devel|Development Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** x|Hacking
** x|Developer Portal
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Dev/Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>8i95n51k1snks5shpeto8lcx9trc6mr</sha1>
    </revision>
    <revision>
      <id>753</id>
      <parentid>373</parentid>
      <timestamp>2013-07-10T15:23:47Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>753</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1567" sha1="jbogqfh6ag7otwjcteua960xw5jklgf" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://anonymousoperatingsystem.wordpress.com/|News Blog
** Screenshots|Screenshots
** Videos|Videos
** Security Guide|Security Guide
** FAQ|FAQ
** Contribute|You Can Help
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** http://sourceforge.net/p/whonix/discussion|User Help Forum
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-users|User Mailing List
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN_.2F_Tunnel_support|VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** OtherOperatingSystems|Windows Support
** BrowserPlugins|Flash Support

* Danger Zone
** Online Profiles|Social Media Profiles
** https://twitter.com/Whonix|@Whonix Twitter
** https://plus.google.com/108150429836421683225/about|Google+
** Facebook|Facebook

* Developers
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-devel|Development Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** Dev/Developer_Portal|Developer Portal / Hacking
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Dev/Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>jbogqfh6ag7otwjcteua960xw5jklgf</sha1>
    </revision>
    <revision>
      <id>754</id>
      <parentid>753</parentid>
      <timestamp>2013-07-10T15:25:02Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>754</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1570" sha1="bkjh3tgc662gx9hfcvrzfozsi6nfxa2" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://anonymousoperatingsystem.wordpress.com/|News Blog
** Screenshots|Screenshots
** Videos|Videos
** Security Guide|Security Guide
** FAQ|FAQ
** Contribute|You Can Help
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** http://sourceforge.net/p/whonix/discussion|User Help Forum
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-users|User Mailing List
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN_.2F_Tunnel_support|VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** Other Operating Systems|Windows Support
** Browser Plugins|Flash Support

* Danger Zone
** Online Profiles|Social Media Profiles
** https://twitter.com/Whonix|@Whonix Twitter
** https://plus.google.com/108150429836421683225/about|Google+
** Facebook|Facebook

* Developers
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-devel|Development Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** Dev/Developer_Portal|Developer Portal / Hacking
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Dev/Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>bkjh3tgc662gx9hfcvrzfozsi6nfxa2</sha1>
    </revision>
    <revision>
      <id>1330</id>
      <parentid>754</parentid>
      <timestamp>2013-07-15T16:18:53Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>1330</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1566" sha1="o1ps2rolrabjlceojzg0w8nblsi7nmq" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://anonymousoperatingsystem.wordpress.com/|News Blog
** Screenshots|Screenshots
** Videos|Videos
** Security Guide|Security Guide
** FAQ|FAQ
** Contribute|You Can Help
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** http://sourceforge.net/p/whonix/discussion|User Help Forum
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-users|User Mailing List
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN_.2F_Tunnel_support|VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** Other Operating Systems|Windows Support
** Browser Plugins|Flash Support

* Danger Zone
** Online Profiles|Social Media Profiles
** https://twitter.com/Whonix|@Whonix Twitter
** https://plus.google.com/108150429836421683225/about|Google+
** Facebook|Facebook

* Developers
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-devel|Development Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** Dev/Developer_Portal|Developer Portal / Hacking
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>o1ps2rolrabjlceojzg0w8nblsi7nmq</sha1>
    </revision>
    <revision>
      <id>1340</id>
      <parentid>1330</parentid>
      <timestamp>2013-07-15T16:57:19Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replace - "Online Profiles" to "Official Whonix Online Profiles"</comment>
      <origin>1340</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1582" sha1="i2go4hyry4moy83l6z4ld8u447cz6tu" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://anonymousoperatingsystem.wordpress.com/|News Blog
** Screenshots|Screenshots
** Videos|Videos
** Security Guide|Security Guide
** FAQ|FAQ
** Contribute|You Can Help
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** http://sourceforge.net/p/whonix/discussion|User Help Forum
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-users|User Mailing List
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN_.2F_Tunnel_support|VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** Other Operating Systems|Windows Support
** Browser Plugins|Flash Support

* Danger Zone
** Official Whonix Online Profiles|Social Media Profiles
** https://twitter.com/Whonix|@Whonix Twitter
** https://plus.google.com/108150429836421683225/about|Google+
** Facebook|Facebook

* Developers
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-devel|Development Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** Dev/Developer_Portal|Developer Portal / Hacking
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>i2go4hyry4moy83l6z4ld8u447cz6tu</sha1>
    </revision>
    <revision>
      <id>1423</id>
      <parentid>1340</parentid>
      <timestamp>2013-07-16T03:33:33Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>1423</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1623" sha1="mcz4iti07rerg30lqnyvfbxnadyejjn" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://anonymousoperatingsystem.wordpress.com/|News Blog
** Screenshots|Screenshots
** Videos|Videos
** Security Guide|Security Guide
** FAQ|FAQ
** Contribute|You Can Help
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** http://sourceforge.net/p/whonix/discussion|User Help Forum
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-users|User Mailing List
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN_.2F_Tunnel_support|VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** Other Operating Systems|Windows Support
** Browser Plugins|Flash Support
** Physical_Isolation|Physical Isolation

* Danger Zone
** Official Whonix Online Profiles|Social Media Profiles
** https://twitter.com/Whonix|@Whonix Twitter
** https://plus.google.com/108150429836421683225/about|Google+
** Facebook|Facebook

* Developers
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-devel|Development Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** Dev/Developer_Portal|Developer Portal / Hacking
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>mcz4iti07rerg30lqnyvfbxnadyejjn</sha1>
    </revision>
    <revision>
      <id>1424</id>
      <parentid>1423</parentid>
      <timestamp>2013-07-16T03:34:54Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>1424</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1617" sha1="eisqhvea068xko6rszai2uwioia8wf6" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://anonymousoperatingsystem.wordpress.com/|News Blog
** Screenshots|Screenshots
** Videos|Videos
** Security Guide|Security Guide
** FAQ|FAQ
** Contribute|You Can Help
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** http://sourceforge.net/p/whonix/discussion|User Help Forum
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-users|User Mailing List
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN_.2F_Tunnel_support|VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** Other Operating Systems|Windows Support
** Browser Plugins|Flash Support
** Physical_Isolation|Physical Isolation

* Danger Zone
** Official Whonix Online Profiles|Social Media Profiles
** https://twitter.com/Whonix|@Whonix Twitter
** https://plus.google.com/108150429836421683225|Google+
** Facebook|Facebook

* Developers
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-devel|Development Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** Dev/Developer_Portal|Developer Portal / Hacking
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>eisqhvea068xko6rszai2uwioia8wf6</sha1>
    </revision>
    <revision>
      <id>1924</id>
      <parentid>1424</parentid>
      <timestamp>2013-07-29T02:53:39Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>1924</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1591" sha1="r843hbb30aroz8qooi9fznq923zcj99" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://anonymousoperatingsystem.wordpress.com/|News Blog
** Screenshots|Screenshots
** Videos|Videos
** Security Guide|Security Guide
** FAQ|FAQ
** Contribute|You Can Help
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** Special:AWCforum|User Help Forum
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-users|User Mailing List
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN_.2F_Tunnel_support|VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** Other Operating Systems|Windows Support
** Browser Plugins|Flash Support
** Physical_Isolation|Physical Isolation

* Danger Zone
** Official Whonix Online Profiles|Social Media Profiles
** https://twitter.com/Whonix|@Whonix Twitter
** https://plus.google.com/108150429836421683225|Google+
** Facebook|Facebook

* Developers
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-devel|Development Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** Dev/Developer_Portal|Developer Portal / Hacking
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>r843hbb30aroz8qooi9fznq923zcj99</sha1>
    </revision>
    <revision>
      <id>1925</id>
      <parentid>1924</parentid>
      <timestamp>2013-07-29T03:17:16Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>1925</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1636" sha1="o4b71yx1f6gzgxj0bvuz0qtfjgn8fny" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://anonymousoperatingsystem.wordpress.com/|News Blog
** Screenshots|Screenshots
** Videos|Videos
** Security Guide|Security Guide
** FAQ|FAQ
** Contribute|You Can Help
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** Special:AWCforum|User Help Forum
** &lt;html&gt;&lt;a href="https://whonix.org/cgi-bin/mailman/listinfo/whonix-users"&gt;User Mailing List&lt;/a&gt;&lt;/html&gt;|User Mailing List
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN_.2F_Tunnel_support|VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** Other Operating Systems|Windows Support
** Browser Plugins|Flash Support
** Physical_Isolation|Physical Isolation

* Danger Zone
** Official Whonix Online Profiles|Social Media Profiles
** https://twitter.com/Whonix|@Whonix Twitter
** https://plus.google.com/108150429836421683225|Google+
** Facebook|Facebook

* Developers
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-devel|Development Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** Dev/Developer_Portal|Developer Portal / Hacking
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>o4b71yx1f6gzgxj0bvuz0qtfjgn8fny</sha1>
    </revision>
    <revision>
      <id>1926</id>
      <parentid>1925</parentid>
      <timestamp>2013-07-29T03:18:16Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>Undo</comment>
      <origin>1926</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1591" sha1="r843hbb30aroz8qooi9fznq923zcj99" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://anonymousoperatingsystem.wordpress.com/|News Blog
** Screenshots|Screenshots
** Videos|Videos
** Security Guide|Security Guide
** FAQ|FAQ
** Contribute|You Can Help
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** Special:AWCforum|User Help Forum
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-users|User Mailing List
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN_.2F_Tunnel_support|VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** Other Operating Systems|Windows Support
** Browser Plugins|Flash Support
** Physical_Isolation|Physical Isolation

* Danger Zone
** Official Whonix Online Profiles|Social Media Profiles
** https://twitter.com/Whonix|@Whonix Twitter
** https://plus.google.com/108150429836421683225|Google+
** Facebook|Facebook

* Developers
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-devel|Development Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** Dev/Developer_Portal|Developer Portal / Hacking
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>r843hbb30aroz8qooi9fznq923zcj99</sha1>
    </revision>
    <revision>
      <id>1928</id>
      <parentid>1926</parentid>
      <timestamp>2013-07-29T03:31:51Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>1928</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1602" sha1="rz0eqls18y6cf1gmaecukdwtxmz8vzc" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://anonymousoperatingsystem.wordpress.com/|News Blog
** Screenshots|Screenshots
** Videos|Videos
** Security Guide|Security Guide
** FAQ|FAQ
** Contribute|You Can Help
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** Special:AWCforum|User Help Forum
** &lt;html&gt;&lt;a href="../cgi-bin/mailman/listinfo/whonix-users"&gt;User Mailing List&lt;/a&gt;&lt;/html&gt;
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN_.2F_Tunnel_support|VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** Other Operating Systems|Windows Support
** Browser Plugins|Flash Support
** Physical_Isolation|Physical Isolation

* Danger Zone
** Official Whonix Online Profiles|Social Media Profiles
** https://twitter.com/Whonix|@Whonix Twitter
** https://plus.google.com/108150429836421683225|Google+
** Facebook|Facebook

* Developers
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-devel|Development Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** Dev/Developer_Portal|Developer Portal / Hacking
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>rz0eqls18y6cf1gmaecukdwtxmz8vzc</sha1>
    </revision>
    <revision>
      <id>1929</id>
      <parentid>1928</parentid>
      <timestamp>2013-07-29T03:32:41Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>Undo</comment>
      <origin>1929</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1591" sha1="r843hbb30aroz8qooi9fznq923zcj99" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://anonymousoperatingsystem.wordpress.com/|News Blog
** Screenshots|Screenshots
** Videos|Videos
** Security Guide|Security Guide
** FAQ|FAQ
** Contribute|You Can Help
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** Special:AWCforum|User Help Forum
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-users|User Mailing List
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN_.2F_Tunnel_support|VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** Other Operating Systems|Windows Support
** Browser Plugins|Flash Support
** Physical_Isolation|Physical Isolation

* Danger Zone
** Official Whonix Online Profiles|Social Media Profiles
** https://twitter.com/Whonix|@Whonix Twitter
** https://plus.google.com/108150429836421683225|Google+
** Facebook|Facebook

* Developers
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-devel|Development Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** Dev/Developer_Portal|Developer Portal / Hacking
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>r843hbb30aroz8qooi9fznq923zcj99</sha1>
    </revision>
    <revision>
      <id>2004</id>
      <parentid>1929</parentid>
      <timestamp>2013-08-01T19:25:36Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <comment>add relative links to mailman</comment>
      <origin>2004</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1609" sha1="pnztxh74go49aqq0cwcaclegfg2oqp1" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://anonymousoperatingsystem.wordpress.com/|News Blog
** Screenshots|Screenshots
** Videos|Videos
** Security Guide|Security Guide
** FAQ|FAQ
** Contribute|You Can Help
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** Special:AWCforum|User Help Forum
** &lt;html&gt;&lt;A href="/cgi-bin/mailman/listinfo/whonix-users"&gt;User Mailing List&lt;/A&gt;&lt;/html&gt;
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN_.2F_Tunnel_support|VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** Other Operating Systems|Windows Support
** Browser Plugins|Flash Support
** Physical_Isolation|Physical Isolation

* Danger Zone
** Official Whonix Online Profiles|Social Media Profiles
** https://twitter.com/Whonix|@Whonix Twitter
** https://plus.google.com/108150429836421683225|Google+
** Facebook|Facebook

* Developers
** &lt;html&gt;&lt;A href="/cgi-bin/mailman/listinfo/whonix-devel"&gt;Development Mailing List&lt;/A&gt;&lt;/html&gt;
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** Dev/Developer_Portal|Developer Portal / Hacking
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>pnztxh74go49aqq0cwcaclegfg2oqp1</sha1>
    </revision>
    <revision>
      <id>2005</id>
      <parentid>2004</parentid>
      <timestamp>2013-08-01T19:26:20Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <comment>Undo revision 2004 by [[Special:Contributions/Fortasse|Fortasse]] ([[User talk:Fortasse|talk]])</comment>
      <origin>2005</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1591" sha1="r843hbb30aroz8qooi9fznq923zcj99" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://anonymousoperatingsystem.wordpress.com/|News Blog
** Screenshots|Screenshots
** Videos|Videos
** Security Guide|Security Guide
** FAQ|FAQ
** Contribute|You Can Help
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** Special:AWCforum|User Help Forum
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-users|User Mailing List
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN_.2F_Tunnel_support|VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** Other Operating Systems|Windows Support
** Browser Plugins|Flash Support
** Physical_Isolation|Physical Isolation

* Danger Zone
** Official Whonix Online Profiles|Social Media Profiles
** https://twitter.com/Whonix|@Whonix Twitter
** https://plus.google.com/108150429836421683225|Google+
** Facebook|Facebook

* Developers
** https://whonix.org/cgi-bin/mailman/listinfo/whonix-devel|Development Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** Dev/Developer_Portal|Developer Portal / Hacking
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>r843hbb30aroz8qooi9fznq923zcj99</sha1>
    </revision>
    <revision>
      <id>2047</id>
      <parentid>2005</parentid>
      <timestamp>2013-08-05T17:54:28Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>2047</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1531" sha1="q9my8akktleqtgafof275wjd4ho9k7q" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://anonymousoperatingsystem.wordpress.com/|News Blog
** Screenshots|Screenshots
** Videos|Videos
** Security Guide|Security Guide
** FAQ|FAQ
** Contribute|You Can Help
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** Special:AWCforum|User Help Forum
** Mailing_Lists#whonix-users|User Mailing List
** Contact|Contact
** Disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN_.2F_Tunnel_support|VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** Other Operating Systems|Windows Support
** Browser Plugins|Flash Support
** Physical_Isolation|Physical Isolation

* Danger Zone
** Official Whonix Online Profiles|Social Media Profiles
** https://twitter.com/Whonix|@Whonix Twitter
** https://plus.google.com/108150429836421683225|Google+
** Facebook|Facebook

* Developers
** Mailing_Lists#whonix-devel|Development Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** Dev/Developer_Portal|Developer Portal / Hacking
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>q9my8akktleqtgafof275wjd4ho9k7q</sha1>
    </revision>
    <revision>
      <id>2720</id>
      <parentid>2047</parentid>
      <timestamp>2013-09-08T22:35:45Z</timestamp>
      <contributor>
        <username>Anon</username>
        <id>10</id>
      </contributor>
      <origin>2720</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1544" sha1="i4yl7rdfreztc4ibpn8gnx86hmx60pu" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://anonymousoperatingsystem.wordpress.com/|News Blog
** Screenshots|Screenshots
** Videos|Videos
** Security Guide|Security Guide
** FAQ|FAQ
** Contribute|You Can Help
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** Special:AWCforum|User Help Forum
** Mailing Lists#whonix-users|User Mailing List
** Contact|Contact
** Whonix:General disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN / Tunnel support|VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** Other Operating Systems|Windows Support
** Browser Plugins|Flash Support
** Physical Isolation|Physical Isolation

* Danger Zone
** Official Whonix Online Profiles|Social Media Profiles
** https://twitter.com/Whonix|@Whonix Twitter
** https://plus.google.com/108150429836421683225|Google+
** Facebook|Facebook

* Developers
** Mailing Lists#whonix-devel|Development Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** Dev/Developer Portal|Developer Portal / Hacking
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>i4yl7rdfreztc4ibpn8gnx86hmx60pu</sha1>
    </revision>
    <revision>
      <id>3503</id>
      <parentid>2720</parentid>
      <timestamp>2013-10-17T00:14:53Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>3503</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1542" sha1="lgzrvbea93ltexc3a6lx0pyfu9kyew5" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://anonymousoperatingsystem.wordpress.com/|News Blog
** Screenshots|Screenshots
** Videos|Videos
** Security Guide|Security Guide
** FAQ|FAQ
** Contribute|You Can Help
** Download#Known_bugs|Known Issues
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** Special:AWCforum|User Help Forum / Support
** Contact|Contact
** Whonix:General disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN / Tunnel support|VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** Other Operating Systems|Windows Support
** Browser Plugins|Flash Support
** Physical Isolation|Physical Isolation

* Danger Zone
** Official Whonix Online Profiles|Social Media Profiles
** https://twitter.com/Whonix|@Whonix Twitter
** https://plus.google.com/108150429836421683225|Google+
** Facebook|Facebook

* Developers
** Mailing Lists#whonix-devel|Development Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** Dev/Developer Portal|Developer Portal / Hacking
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>lgzrvbea93ltexc3a6lx0pyfu9kyew5</sha1>
    </revision>
    <revision>
      <id>3504</id>
      <parentid>3503</parentid>
      <timestamp>2013-10-17T00:15:37Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>3504</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1533" sha1="hr2yhxn5eznljob4f9d4sglbs2rsduh" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://anonymousoperatingsystem.wordpress.com/|News Blog
** Screenshots|Screenshots
** Videos|Videos
** Security Guide|Security Guide
** FAQ|FAQ
** Contribute|You Can Help
** Download#Known_bugs|Known Issues
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** Support|User Help Forum / Support
** Contact|Contact
** Whonix:General disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN / Tunnel support|VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** Other Operating Systems|Windows Support
** Browser Plugins|Flash Support
** Physical Isolation|Physical Isolation

* Danger Zone
** Official Whonix Online Profiles|Social Media Profiles
** https://twitter.com/Whonix|@Whonix Twitter
** https://plus.google.com/108150429836421683225|Google+
** Facebook|Facebook

* Developers
** Mailing Lists#whonix-devel|Development Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** Dev/Developer Portal|Developer Portal / Hacking
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>hr2yhxn5eznljob4f9d4sglbs2rsduh</sha1>
    </revision>
    <revision>
      <id>4021</id>
      <parentid>3504</parentid>
      <timestamp>2013-11-11T13:52:07Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>4021</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1578" sha1="hgdv0jux06uklm3vu7prn0f03wij3h5" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://anonymousoperatingsystem.wordpress.com/|News Blog
** Screenshots|Screenshots
** Videos|Videos
** Security Guide|Security Guide
** FAQ|FAQ
** Contribute|You Can Help
** Download#Known_bugs|Known Issues
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** Support|User Help Forum / Support
** Contact|Contact
** Whonix:General disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN / Tunnel support|VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** Other Operating Systems|Windows Support
** Browser Plugins|Flash Support
** Physical Isolation|Physical Isolation

* Danger Zone
** Official Whonix Online Profiles|Social Media Profiles
** https://twitter.com/Whonix|@Whonix Twitter
** https://plus.google.com/108150429836421683225|Google+
** https://www.facebook.com/pages/Whonix/622399681135624|Facebook

* Developers
** Mailing Lists#whonix-devel|Development Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** Dev/Developer Portal|Developer Portal / Hacking
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>hgdv0jux06uklm3vu7prn0f03wij3h5</sha1>
    </revision>
    <revision>
      <id>4790</id>
      <parentid>4021</parentid>
      <timestamp>2014-01-18T17:10:12Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>Replaced content with "* SEARCH  * TOOLBOX ** recentchanges-url|recentchanges ** randompage-url|randompage ** helppage|help  * LANGUAGES"</comment>
      <origin>4790</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="113" sha1="3mhu15l4fnefafxvptvlwj1c381ybn4" xml:space="preserve">* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>3mhu15l4fnefafxvptvlwj1c381ybn4</sha1>
    </revision>
    <revision>
      <id>4791</id>
      <parentid>4790</parentid>
      <timestamp>2014-01-18T17:15:21Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>4791</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1578" sha1="hgdv0jux06uklm3vu7prn0f03wij3h5" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://anonymousoperatingsystem.wordpress.com/|News Blog
** Screenshots|Screenshots
** Videos|Videos
** Security Guide|Security Guide
** FAQ|FAQ
** Contribute|You Can Help
** Download#Known_bugs|Known Issues
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** Support|User Help Forum / Support
** Contact|Contact
** Whonix:General disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN / Tunnel support|VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** Other Operating Systems|Windows Support
** Browser Plugins|Flash Support
** Physical Isolation|Physical Isolation

* Danger Zone
** Official Whonix Online Profiles|Social Media Profiles
** https://twitter.com/Whonix|@Whonix Twitter
** https://plus.google.com/108150429836421683225|Google+
** https://www.facebook.com/pages/Whonix/622399681135624|Facebook

* Developers
** Mailing Lists#whonix-devel|Development Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** Dev/Developer Portal|Developer Portal / Hacking
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>hgdv0jux06uklm3vu7prn0f03wij3h5</sha1>
    </revision>
    <revision>
      <id>4792</id>
      <parentid>4791</parentid>
      <timestamp>2014-01-18T17:32:21Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>Blanked the page</comment>
      <origin>4792</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="0" sha1="phoiac9h4m842xq45sp7s6u21eteeq1" xml:space="preserve" />
      <sha1>phoiac9h4m842xq45sp7s6u21eteeq1</sha1>
    </revision>
    <revision>
      <id>4793</id>
      <parentid>4792</parentid>
      <timestamp>2014-01-18T17:32:57Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>4793</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="600" sha1="mbhi5hplg5eermaavpzlhx2ccp6jpel" xml:space="preserve">* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://anonymousoperatingsystem.wordpress.com/|News Blog
** Screenshots|Screenshots
** Videos|Videos
** Security Guide|Security Guide
** FAQ|FAQ
** Contribute|You Can Help
** Download#Known_bugs|Known Issues
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** Support|User Help Forum / Support
** Contact|Contact
** Whonix:General disclaimer|Disclaimer</text>
      <sha1>mbhi5hplg5eermaavpzlhx2ccp6jpel</sha1>
    </revision>
    <revision>
      <id>4794</id>
      <parentid>4793</parentid>
      <timestamp>2014-01-18T17:33:27Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>4794</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1578" sha1="hgdv0jux06uklm3vu7prn0f03wij3h5" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://anonymousoperatingsystem.wordpress.com/|News Blog
** Screenshots|Screenshots
** Videos|Videos
** Security Guide|Security Guide
** FAQ|FAQ
** Contribute|You Can Help
** Download#Known_bugs|Known Issues
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** Support|User Help Forum / Support
** Contact|Contact
** Whonix:General disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN / Tunnel support|VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** Other Operating Systems|Windows Support
** Browser Plugins|Flash Support
** Physical Isolation|Physical Isolation

* Danger Zone
** Official Whonix Online Profiles|Social Media Profiles
** https://twitter.com/Whonix|@Whonix Twitter
** https://plus.google.com/108150429836421683225|Google+
** https://www.facebook.com/pages/Whonix/622399681135624|Facebook

* Developers
** Mailing Lists#whonix-devel|Development Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** Dev/Developer Portal|Developer Portal / Hacking
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>hgdv0jux06uklm3vu7prn0f03wij3h5</sha1>
    </revision>
    <revision>
      <id>4834</id>
      <parentid>4794</parentid>
      <timestamp>2014-01-24T01:20:08Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>4834</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1556" sha1="lp2t4tcrg4332t86dwy6vg0uhliimb2" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://anonymousoperatingsystem.wordpress.com/|News Blog
** Screenshots|Screenshots
** Videos|Videos
** Security Guide|Security Guide
** FAQ|FAQ
** Contribute|You Can Help
** Download#Known_bugs|Known Issues
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** Support|User Help Forum / Support
** Contact|Contact
** Whonix:General disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN / Tunnel support|VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** Other Operating Systems|Windows Support
** Browser Plugins|Flash Support
** Physical Isolation|Physical Isolation

* Danger Zone
** Official Whonix Online Profiles|Social Media Profiles
** https://twitter.com/Whonix|@Whonix Twitter
** https://plus.google.com/108150429836421683225|Google+
** https://www.facebook.com/Whonix|Facebook

* Developers
** Mailing Lists#whonix-devel|Development Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** Dev/Developer Portal|Developer Portal / Hacking
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>lp2t4tcrg4332t86dwy6vg0uhliimb2</sha1>
    </revision>
    <revision>
      <id>4858</id>
      <parentid>4834</parentid>
      <timestamp>2014-02-01T18:32:32Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>4858</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1536" sha1="f2d9nrcnfjrrsnboa55t5yn0jh27gqk" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://www.whonix.org/blog|News Blog
** Screenshots|Screenshots
** Videos|Videos
** Security Guide|Security Guide
** FAQ|FAQ
** Contribute|You Can Help
** Download#Known_bugs|Known Issues
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** Support|User Help Forum / Support
** Contact|Contact
** Whonix:General disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN / Tunnel support|VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** Other Operating Systems|Windows Support
** Browser Plugins|Flash Support
** Physical Isolation|Physical Isolation

* Danger Zone
** Official Whonix Online Profiles|Social Media Profiles
** https://twitter.com/Whonix|@Whonix Twitter
** https://plus.google.com/108150429836421683225|Google+
** https://www.facebook.com/Whonix|Facebook

* Developers
** Mailing Lists#whonix-devel|Development Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** Dev/Developer Portal|Developer Portal / Hacking
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Dev/Changelog|Changelog
** Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>f2d9nrcnfjrrsnboa55t5yn0jh27gqk</sha1>
    </revision>
    <revision>
      <id>5559</id>
      <parentid>4858</parentid>
      <timestamp>2014-02-22T02:27:21Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>5559</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1509" sha1="noxshsksfa7qppy2rq2dfduzm3uto6f" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://www.whonix.org/blog|News Blog
** Screenshots|Screenshots
** Videos|Videos
** Security Guide|Security Guide
** FAQ|FAQ
** Contribute|You Can Help
** Download#Known_bugs|Known Issues
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** Support|User Help Forum / Support
** Contact|Contact
** Whonix:General disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN / Tunnel support|VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** Other Operating Systems|Windows Support
** Browser Plugins|Flash Support
** Physical Isolation|Physical Isolation

* Danger Zone
** Official Whonix Online Profiles|Social Media Profiles
** https://twitter.com/Whonix|@Whonix Twitter
** https://plus.google.com/108150429836421683225|Google+
** https://www.facebook.com/Whonix|Facebook

* Developers
** Mailing Lists#whonix-devel|Development Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** Dev/Developer Portal|Developer Portal / Hacking
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>noxshsksfa7qppy2rq2dfduzm3uto6f</sha1>
    </revision>
    <revision>
      <id>5561</id>
      <parentid>5559</parentid>
      <timestamp>2014-02-22T02:30:22Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>5561</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1511" sha1="8ba2kjlko2764xvbo3ok07oneabfizz" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://www.whonix.org/blog|News Blog
** Screenshots|Screenshots
** Videos|Videos
** Security Guide|Security Guide
** FAQ|FAQ
** Contribute|You Can Help
** Download#Known_bugs|Known Issues
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** Support|User Help Forum / Support
** Contact|Contact
** Whonix:General disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN_and_Tunnel_Support|VPN/Tunnel Support
** HostingLocationHiddenServices|Location/IP Hidden Servers
** Other Operating Systems|Windows Support
** Browser Plugins|Flash Support
** Physical Isolation|Physical Isolation

* Danger Zone
** Official Whonix Online Profiles|Social Media Profiles
** https://twitter.com/Whonix|@Whonix Twitter
** https://plus.google.com/108150429836421683225|Google+
** https://www.facebook.com/Whonix|Facebook

* Developers
** Mailing Lists#whonix-devel|Development Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** Dev/Developer Portal|Developer Portal / Hacking
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>8ba2kjlko2764xvbo3ok07oneabfizz</sha1>
    </revision>
    <revision>
      <id>5564</id>
      <parentid>5561</parentid>
      <timestamp>2014-02-22T02:32:13Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>5564</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1514" sha1="hsyijhyhxfa1sfgomd8f0e87ysrzh59" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://www.whonix.org/blog|News Blog
** Screenshots|Screenshots
** Videos|Videos
** Security Guide|Security Guide
** FAQ|FAQ
** Contribute|You Can Help
** Download#Known_bugs|Known Issues
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** Support|User Help Forum / Support
** Contact|Contact
** Whonix:General disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN_and_Tunnel_Support|VPN/Tunnel Support
** Hosting_Location_Hidden_Services|Location/IP Hidden Servers
** Other Operating Systems|Windows Support
** Browser Plugins|Flash Support
** Physical Isolation|Physical Isolation

* Danger Zone
** Official Whonix Online Profiles|Social Media Profiles
** https://twitter.com/Whonix|@Whonix Twitter
** https://plus.google.com/108150429836421683225|Google+
** https://www.facebook.com/Whonix|Facebook

* Developers
** Mailing Lists#whonix-devel|Development Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** Dev/Developer Portal|Developer Portal / Hacking
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>hsyijhyhxfa1sfgomd8f0e87ysrzh59</sha1>
    </revision>
    <revision>
      <id>6132</id>
      <parentid>5564</parentid>
      <timestamp>2014-03-01T20:53:15Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>Replaced content with "* users ** Main Page|Homepage ** About|About ** Features|Features ** Download|Downloads"</comment>
      <origin>6132</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="87" sha1="hgwu8b6coxuuyv6n068s2t5a5smk8cu" xml:space="preserve">* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads</text>
      <sha1>hgwu8b6coxuuyv6n068s2t5a5smk8cu</sha1>
    </revision>
    <revision>
      <id>6133</id>
      <parentid>6132</parentid>
      <timestamp>2014-03-01T20:55:07Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>Undo revision 6132 by [[Special:Contributions/Adrelanos|Adrelanos]] ([[User talk:Adrelanos|talk]])</comment>
      <origin>6133</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1514" sha1="hsyijhyhxfa1sfgomd8f0e87ysrzh59" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://www.whonix.org/blog|News Blog
** Screenshots|Screenshots
** Videos|Videos
** Security Guide|Security Guide
** FAQ|FAQ
** Contribute|You Can Help
** Download#Known_bugs|Known Issues
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** Support|User Help Forum / Support
** Contact|Contact
** Whonix:General disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN_and_Tunnel_Support|VPN/Tunnel Support
** Hosting_Location_Hidden_Services|Location/IP Hidden Servers
** Other Operating Systems|Windows Support
** Browser Plugins|Flash Support
** Physical Isolation|Physical Isolation

* Danger Zone
** Official Whonix Online Profiles|Social Media Profiles
** https://twitter.com/Whonix|@Whonix Twitter
** https://plus.google.com/108150429836421683225|Google+
** https://www.facebook.com/Whonix|Facebook

* Developers
** Mailing Lists#whonix-devel|Development Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** Dev/Developer Portal|Developer Portal / Hacking
** https://github.com/Whonix/Whonix/issues|Development Tickets
** Authorship|Authorship

* SEARCH

* TOOLBOX
** recentchanges-url|recentchanges
** randompage-url|randompage
** helppage|help

* LANGUAGES</text>
      <sha1>hsyijhyhxfa1sfgomd8f0e87ysrzh59</sha1>
    </revision>
    <revision>
      <id>6160</id>
      <parentid>6133</parentid>
      <timestamp>2014-03-01T22:31:23Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>6160</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1324" sha1="l95aqc0psg1h0u2b3wanocyvn978yaw" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://www.whonix.org/blog|News Blog
** Screenshots|Screenshots
** FAQ|FAQ
** Contribute|You Can Help
** Download#Known_bugs|Known Issues
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** Support|User Help Forum / Support
** Contact|Contact
** Whonix:General disclaimer|Disclaimer

* Frequently Asked Features
** Bridges|Bridges Support
** Features#VPN_and_Tunnel_Support|VPN/Tunnel Support
** Hosting_Location_Hidden_Services|Location/IP Hidden Servers
** Other Operating Systems|Windows Support
** Browser Plugins|Flash Support
** Physical Isolation|Physical Isolation

* Danger Zone
** Official Whonix Online Profiles|Social Media Profiles
** https://twitter.com/Whonix|@Whonix Twitter
** https://plus.google.com/108150429836421683225|Google+
** https://www.facebook.com/Whonix|Facebook

* Developers
** Mailing Lists#whonix-devel|Development Mailing List
** Contribute|Contribute
** Design|Technical Design
** https://github.com/Whonix/Whonix/|Source Code
** Dev/Developer Portal|Developer Portal / Hacking
** https://github.com/Whonix/Whonix/issues|Development Tickets</text>
      <sha1>l95aqc0psg1h0u2b3wanocyvn978yaw</sha1>
    </revision>
    <revision>
      <id>6161</id>
      <parentid>6160</parentid>
      <timestamp>2014-03-01T22:34:11Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>6161</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="567" sha1="p145b3zb908e0nzzxmf5jil0opr43p0" xml:space="preserve">
* users
** Main Page|Homepage
** About|About
** Features|Features
** Download|Downloads
** Documentation|Documentation
** https://www.whonix.org/blog|News Blog
** Screenshots|Screenshots
** FAQ|FAQ
** Contribute|You Can Help
** Download#Known_bugs|Known Issues
** https://github.com/Whonix/Whonix/issues?labels=bug&amp;page=1&amp;state=open|Bugs
** https://github.com/Whonix/Whonix/issues?labels=enhancement&amp;page=1&amp;state=open|Feature Requests
** Support|User Help Forum / Support
** Contact|Contact
** Whonix:General disclaimer|Disclaimer

* Dev/Developer Portal|Development</text>
      <sha1>p145b3zb908e0nzzxmf5jil0opr43p0</sha1>
    </revision>
    <revision>
      <id>6162</id>
      <parentid>6161</parentid>
      <timestamp>2014-03-01T22:35:29Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>6162</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="146" sha1="84tlbks7q4tztwhxbzxvannou57ojra" xml:space="preserve">* Main Page|Home
* Download|Download
* Documentation|Documentation
* https://www.whonix.org/blog|Blog
* Support
* Dev/Developer Portal|Development</text>
      <sha1>84tlbks7q4tztwhxbzxvannou57ojra</sha1>
    </revision>
    <revision>
      <id>6164</id>
      <parentid>6162</parentid>
      <timestamp>2014-03-01T22:36:20Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>6164</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="159" sha1="hovzjzlu4md1ahoudtz29cph24pl5p4" xml:space="preserve">* Menu
** Main Page|Home
** Download|Download
** Documentation|Documentation
** https://www.whonix.org/blog|Blog
** Support
** Dev/Developer Portal|Development</text>
      <sha1>hovzjzlu4md1ahoudtz29cph24pl5p4</sha1>
    </revision>
    <revision>
      <id>6165</id>
      <parentid>6164</parentid>
      <timestamp>2014-03-01T22:36:56Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>6165</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="150" sha1="inuobh99siqn1lbafhwedoxc0v3fo8i" xml:space="preserve">* Menu
** Main Page|Home
** Download
** Documentation|Documentation
** https://www.whonix.org/blog|Blog
** Support
** Dev/Developer Portal|Development</text>
      <sha1>inuobh99siqn1lbafhwedoxc0v3fo8i</sha1>
    </revision>
    <revision>
      <id>6166</id>
      <parentid>6165</parentid>
      <timestamp>2014-03-01T22:37:25Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>6166</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="159" sha1="hovzjzlu4md1ahoudtz29cph24pl5p4" xml:space="preserve">* Menu
** Main Page|Home
** Download|Download
** Documentation|Documentation
** https://www.whonix.org/blog|Blog
** Support
** Dev/Developer Portal|Development</text>
      <sha1>hovzjzlu4md1ahoudtz29cph24pl5p4</sha1>
    </revision>
    <revision>
      <id>6167</id>
      <parentid>6166</parentid>
      <timestamp>2014-03-01T22:41:56Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>6167</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="160" sha1="gmww6fxb7sa1e96mt8qhuk7s1q9n6ms" xml:space="preserve">* Menu
** Main Page|Home
** Download| Download
** Documentation|Documentation
** https://www.whonix.org/blog|Blog
** Support
** Dev/Developer Portal|Development</text>
      <sha1>gmww6fxb7sa1e96mt8qhuk7s1q9n6ms</sha1>
    </revision>
    <revision>
      <id>6168</id>
      <parentid>6167</parentid>
      <timestamp>2014-03-01T22:42:23Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>6168</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="160" sha1="7vzj8m73i6hyae50luv03df5dwl0b07" xml:space="preserve">* Menu
** Main Page|Home
** Download |Download
** Documentation|Documentation
** https://www.whonix.org/blog|Blog
** Support
** Dev/Developer Portal|Development</text>
      <sha1>7vzj8m73i6hyae50luv03df5dwl0b07</sha1>
    </revision>
    <revision>
      <id>6169</id>
      <parentid>6168</parentid>
      <timestamp>2014-03-01T22:42:44Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>6169</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="159" sha1="hovzjzlu4md1ahoudtz29cph24pl5p4" xml:space="preserve">* Menu
** Main Page|Home
** Download|Download
** Documentation|Documentation
** https://www.whonix.org/blog|Blog
** Support
** Dev/Developer Portal|Development</text>
      <sha1>hovzjzlu4md1ahoudtz29cph24pl5p4</sha1>
    </revision>
    <revision>
      <id>6172</id>
      <parentid>6169</parentid>
      <timestamp>2014-03-01T22:44:40Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>6172</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="159" sha1="jg9abmbs8me1lnzuthvxf4tewaias7h" xml:space="preserve">* Menu
** Main Page|Home
** Documentation|Documentation
** Download|Download
** https://www.whonix.org/blog|Blog
** Support
** Dev/Developer Portal|Development</text>
      <sha1>jg9abmbs8me1lnzuthvxf4tewaias7h</sha1>
    </revision>
    <revision>
      <id>6173</id>
      <parentid>6172</parentid>
      <timestamp>2014-03-01T22:45:37Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>6173</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="146" sha1="lh0m9ar9q9t6ndjsvtumt8d4npn0dok" xml:space="preserve">* Main Page|Home
* Documentation|Documentation
* Download|Download
* https://www.whonix.org/blog|Blog
* Support
* Dev/Developer Portal|Development</text>
      <sha1>lh0m9ar9q9t6ndjsvtumt8d4npn0dok</sha1>
    </revision>
    <revision>
      <id>6174</id>
      <parentid>6173</parentid>
      <timestamp>2014-03-01T22:46:04Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <comment>Undo revision 6173 by [[Special:Contributions/Fortasse|Fortasse]] ([[User talk:Fortasse|talk]])</comment>
      <origin>6174</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="159" sha1="jg9abmbs8me1lnzuthvxf4tewaias7h" xml:space="preserve">* Menu
** Main Page|Home
** Documentation|Documentation
** Download|Download
** https://www.whonix.org/blog|Blog
** Support
** Dev/Developer Portal|Development</text>
      <sha1>jg9abmbs8me1lnzuthvxf4tewaias7h</sha1>
    </revision>
    <revision>
      <id>6175</id>
      <parentid>6174</parentid>
      <timestamp>2014-03-01T22:46:29Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>6175</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="160" sha1="2tj6i9g0qpvzitayiy19nd9pw0jwq2z" xml:space="preserve">* Menu
** Main Page|Home
** Download|Downloads
** Documentation|Documentation
** https://www.whonix.org/blog|Blog
** Support
** Dev/Developer Portal|Development</text>
      <sha1>2tj6i9g0qpvzitayiy19nd9pw0jwq2z</sha1>
    </revision>
    <revision>
      <id>6176</id>
      <parentid>6175</parentid>
      <timestamp>2014-03-01T22:47:15Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>6176</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="159" sha1="p7h37ync5pgiicb0nt0gag0979s6jjm" xml:space="preserve">* Menu
** Main Page|Home
** download|Download
** Documentation|Documentation
** https://www.whonix.org/blog|Blog
** Support
** Dev/Developer Portal|Development</text>
      <sha1>p7h37ync5pgiicb0nt0gag0979s6jjm</sha1>
    </revision>
    <revision>
      <id>6177</id>
      <parentid>6176</parentid>
      <timestamp>2014-03-01T22:48:02Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>6177</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="154" sha1="ecqztw9j851lfqlg0venwgytxboklcw" xml:space="preserve">* Menu
** Main Page|Home
** [[Download]]
** Documentation|Documentation
** https://www.whonix.org/blog|Blog
** Support
** Dev/Developer Portal|Development</text>
      <sha1>ecqztw9j851lfqlg0venwgytxboklcw</sha1>
    </revision>
    <revision>
      <id>6178</id>
      <parentid>6177</parentid>
      <timestamp>2014-03-01T22:48:18Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>6178</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="163" sha1="4lx7n5llorchz9tw3c3p8yyflyuewy8" xml:space="preserve">* Menu
** Main Page|Home
** [[Download]]|Download
** Documentation|Documentation
** https://www.whonix.org/blog|Blog
** Support
** Dev/Developer Portal|Development</text>
      <sha1>4lx7n5llorchz9tw3c3p8yyflyuewy8</sha1>
    </revision>
    <revision>
      <id>6179</id>
      <parentid>6178</parentid>
      <timestamp>2014-03-01T22:48:34Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>6179</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="159" sha1="hovzjzlu4md1ahoudtz29cph24pl5p4" xml:space="preserve">* Menu
** Main Page|Home
** Download|Download
** Documentation|Documentation
** https://www.whonix.org/blog|Blog
** Support
** Dev/Developer Portal|Development</text>
      <sha1>hovzjzlu4md1ahoudtz29cph24pl5p4</sha1>
    </revision>
    <revision>
      <id>6180</id>
      <parentid>6179</parentid>
      <timestamp>2014-03-01T22:49:08Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>6180</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="161" sha1="395yrw39871gw649z65w8hi494btt63" xml:space="preserve">* Menu
** Main Page|Home
** Download | Download
** Documentation|Documentation
** https://www.whonix.org/blog|Blog
** Support
** Dev/Developer Portal|Development</text>
      <sha1>395yrw39871gw649z65w8hi494btt63</sha1>
    </revision>
    <revision>
      <id>6181</id>
      <parentid>6180</parentid>
      <timestamp>2014-03-01T22:50:46Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>6181</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="169" sha1="jw7dl9d0eogybxe8rnyne9el9u409ld" xml:space="preserve">* Menu
** Main Page | Home
** Download | Download
** Documentation | Documentation
** https://www.whonix.org/blog | Blog
** Support
** Dev/Developer Portal | Development</text>
      <sha1>jw7dl9d0eogybxe8rnyne9el9u409ld</sha1>
    </revision>
    <revision>
      <id>6182</id>
      <parentid>6181</parentid>
      <timestamp>2014-03-01T22:52:57Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>6182</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="170" sha1="e6yta5jq2ynmwl0fbvmo5kot8u6d9d2" xml:space="preserve">* Menu
** Main Page | Home
** Download | Downloads
** Documentation | Documentation
** https://www.whonix.org/blog | Blog
** Support
** Dev/Developer Portal | Development</text>
      <sha1>e6yta5jq2ynmwl0fbvmo5kot8u6d9d2</sha1>
    </revision>
    <revision>
      <id>6185</id>
      <parentid>6182</parentid>
      <timestamp>2014-03-01T22:58:06Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>6185</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="166" sha1="42p22tgognk798bhd4v4gby81q08i8y" xml:space="preserve">* Menu
** Main Page | HOME
** Download | DOWNLOADS
** Documentation | DOCUMENTATION
** https://www.whonix.org/blog | BLOG
** SUPPORT
** Dev/Developer Portal | DEVELOP</text>
      <sha1>42p22tgognk798bhd4v4gby81q08i8y</sha1>
    </revision>
    <revision>
      <id>6211</id>
      <parentid>6185</parentid>
      <timestamp>2014-03-02T03:09:38Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>6211</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="187" sha1="cixtn70ixw3qjpctrmg3tk9w5nkhssj" xml:space="preserve">* Menu
** Main Page | HOME
** Download | DOWNLOADS
** Documentation | DOCUMENTATION
** Support | SUPPORT
** https://www.whonix.org/blog | BLOG
** SUPPORT
** Dev/Developer Portal | DEVELOP</text>
      <sha1>cixtn70ixw3qjpctrmg3tk9w5nkhssj</sha1>
    </revision>
    <revision>
      <id>7420</id>
      <parentid>6211</parentid>
      <timestamp>2014-04-08T21:54:43Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>7420</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="220" sha1="rzsnacibiswxbqtynwzazar8a2qy8bh" xml:space="preserve">* Menu
** Main Page | HOME
** Download | DOWNLOADS
** Documentation | DOCUMENTATION
** Support | SUPPORT
** https://www.whonix.org/blog | BLOG
** https://www.whonix.org/forum | COMMUNITY
** Dev/Developer Portal | DEVELOP</text>
      <sha1>rzsnacibiswxbqtynwzazar8a2qy8bh</sha1>
    </revision>
    <revision>
      <id>7435</id>
      <parentid>7420</parentid>
      <timestamp>2014-04-09T00:38:51Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>7435</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="199" sha1="dspl52g78wekgnko2iu5nayejaml5me" xml:space="preserve">* Menu
** Main Page | HOME
** Download | DOWNLOADS
** Documentation | DOCUMENTATION
** https://www.whonix.org/blog | BLOG
** https://www.whonix.org/forum | COMMUNITY
** Dev/Developer Portal | DEVELOP</text>
      <sha1>dspl52g78wekgnko2iu5nayejaml5me</sha1>
    </revision>
    <revision>
      <id>7542</id>
      <parentid>7435</parentid>
      <timestamp>2014-04-15T01:06:15Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>7542</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="220" sha1="qxmbf43iw4ra1xqvot6m453tkc4512u" xml:space="preserve">* Menu
** Main Page | HOME
** Download | DOWNLOADS
** Documentation | DOCUMENTATION
** https://www.whonix.org/blog | BLOG
** Support | SUPPORT
** https://www.whonix.org/forum | COMMUNITY
** Dev/Developer Portal | DEVELOP</text>
      <sha1>qxmbf43iw4ra1xqvot6m453tkc4512u</sha1>
    </revision>
    <revision>
      <id>15078</id>
      <parentid>7542</parentid>
      <timestamp>2015-03-02T21:43:17Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>15078</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="222" sha1="qn6g6j86lraqtpjgqm21zsbs8c71f4q" xml:space="preserve">* Menu
** Main Page | HOME
** Download | DOWNLOADS
** Documentation | DOCUMENTATION
** https://www.whonix.org/blog/ | BLOG
** Support | SUPPORT
** https://www.whonix.org/forum/ | COMMUNITY
** Dev/Developer Portal | DEVELOP</text>
      <sha1>qn6g6j86lraqtpjgqm21zsbs8c71f4q</sha1>
    </revision>
    <revision>
      <id>17027</id>
      <parentid>15078</parentid>
      <timestamp>2015-09-01T13:24:32Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>17027</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="238" sha1="nt6a3atf44y4r769dv6cyy51e30xljc" xml:space="preserve">* Menu
** Main Page | HOME
** Main_Page#Download_Whonix | DOWNLOAD
** Documentation | DOCUMENTATION
** https://www.whonix.org/blog/ | BLOG
** Support | SUPPORT
** https://www.whonix.org/forum/ | COMMUNITY
** Dev/Developer Portal | DEVELOP</text>
      <sha1>nt6a3atf44y4r769dv6cyy51e30xljc</sha1>
    </revision>
    <revision>
      <id>19054</id>
      <parentid>17027</parentid>
      <timestamp>2015-11-07T21:20:59Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>19054</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="251" sha1="t6kxceqjq5c1m3pmnkknr8sac9n54oa" xml:space="preserve">* Menu
** https://www.whonix.org | HOME
** Main_Page#Download_Whonix | DOWNLOAD
** Documentation | DOCUMENTATION
** https://www.whonix.org/blog/ | BLOG
** Support | SUPPORT
** https://www.whonix.org/forum/ | COMMUNITY
** Dev/Developer Portal | DEVELOP</text>
      <sha1>t6kxceqjq5c1m3pmnkknr8sac9n54oa</sha1>
    </revision>
    <revision>
      <id>19055</id>
      <parentid>19054</parentid>
      <timestamp>2015-11-07T21:25:21Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>Undo revision 19054 by [[Special:Contributions/Patrick|Patrick]] ([[User talk:Patrick|talk]])</comment>
      <origin>19055</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="238" sha1="nt6a3atf44y4r769dv6cyy51e30xljc" xml:space="preserve">* Menu
** Main Page | HOME
** Main_Page#Download_Whonix | DOWNLOAD
** Documentation | DOCUMENTATION
** https://www.whonix.org/blog/ | BLOG
** Support | SUPPORT
** https://www.whonix.org/forum/ | COMMUNITY
** Dev/Developer Portal | DEVELOP</text>
      <sha1>nt6a3atf44y4r769dv6cyy51e30xljc</sha1>
    </revision>
    <revision>
      <id>19155</id>
      <parentid>19055</parentid>
      <timestamp>2015-11-16T02:58:21Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>19155</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="234" sha1="etbwyghjz0105mjyzai34bhkob82au5" xml:space="preserve">* Menu
** Main Page | HOME
** Main_Page#Download_Whonix | DOWNLOAD
** Documentation | DOCUMENTATION
** https://www.whonix.org/blog/ | BLOG
** Support | SUPPORT
** https://forums.whonix.org | COMMUNITY
** Dev/Developer Portal | DEVELOP</text>
      <sha1>etbwyghjz0105mjyzai34bhkob82au5</sha1>
    </revision>
    <revision>
      <id>19420</id>
      <parentid>19155</parentid>
      <timestamp>2015-11-27T18:34:19Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>19420</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="217" sha1="tpw7r8sdytobzyma9yccse6n6tzqfqe" xml:space="preserve">* Menu
** Main Page | HOME
** Download | DOWNLOAD
** Documentation | DOCUMENTATION
** https://www.whonix.org/blog/ | BLOG
** Support | SUPPORT
** https://forums.whonix.org | COMMUNITY
** Dev/Developer Portal | DEVELOP</text>
      <sha1>tpw7r8sdytobzyma9yccse6n6tzqfqe</sha1>
    </revision>
    <revision>
      <id>22177</id>
      <parentid>19420</parentid>
      <timestamp>2016-02-11T20:17:33Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>22177</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="217" sha1="4u1hkqfx6z1y7kaf608hbignqc0qna1" xml:space="preserve">* Menu
** Main Page | HOME
** Download | DOWNLOAD
** Documentation | DOCUMENTATION
** https://www.whonix.org/blog/ | NEWS
** Support | SUPPORT
** https://forums.whonix.org | COMMUNITY
** Dev/Developer Portal | DEVELOP</text>
      <sha1>4u1hkqfx6z1y7kaf608hbignqc0qna1</sha1>
    </revision>
    <revision>
      <id>22178</id>
      <parentid>22177</parentid>
      <timestamp>2016-02-11T20:18:01Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>22178</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="183" sha1="s1o7kozquns96ltgba29w9kcfsai829" xml:space="preserve">* Menu
** Main Page | HOME
** Download | DOWNLOAD
** Documentation | DOCUMENTATION
** https://www.whonix.org/blog/ | NEWS
** Support | SUPPORT
** https://forums.whonix.org | COMMUNITY</text>
      <sha1>s1o7kozquns96ltgba29w9kcfsai829</sha1>
    </revision>
    <revision>
      <id>22179</id>
      <parentid>22178</parentid>
      <timestamp>2016-02-11T20:19:03Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>22179</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="139" sha1="mhd17vvitpp686rvionwwgvsypznoig" xml:space="preserve">* Menu
** Main Page | HOME
** Download | DOWNLOAD
** Documentation | DOCUMENTATION
** Support | HELP
** https://www.whonix.org/blog/ | NEWS</text>
      <sha1>mhd17vvitpp686rvionwwgvsypznoig</sha1>
    </revision>
    <revision>
      <id>22180</id>
      <parentid>22179</parentid>
      <timestamp>2016-02-11T20:19:15Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>22180</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="106" sha1="glue96idtsfoeqw6e4d7t0rexf0gyyf" xml:space="preserve">* Menu
** Main Page | HOME
** Download | DOWNLOAD
** Support | HELP
** https://www.whonix.org/blog/ | NEWS</text>
      <sha1>glue96idtsfoeqw6e4d7t0rexf0gyyf</sha1>
    </revision>
    <revision>
      <id>23958</id>
      <parentid>22180</parentid>
      <timestamp>2016-06-05T14:14:35Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>23958</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="130" sha1="s4h60hf0kadp8xvn8ssczclq276w21y" xml:space="preserve">* Menu
** Main Page | HOME
** Download | DOWNLOAD
** Documentation | DOCS
** Support | HELP
** https://www.whonix.org/blog/ | NEWS</text>
      <sha1>s4h60hf0kadp8xvn8ssczclq276w21y</sha1>
    </revision>
    <revision>
      <id>26039</id>
      <parentid>23958</parentid>
      <timestamp>2016-10-18T16:14:33Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>26039</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="143" sha1="2cv64bp7bmoyx7gcd0fpgfviyp8bjgj" xml:space="preserve">* Menu
** https://www.whonix.org | HOME
** Download | DOWNLOAD
** Documentation | DOCS
** Support | HELP
** https://www.whonix.org/blog/ | NEWS</text>
      <sha1>2cv64bp7bmoyx7gcd0fpgfviyp8bjgj</sha1>
    </revision>
    <revision>
      <id>37154</id>
      <parentid>26039</parentid>
      <timestamp>2018-09-27T09:22:33Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>37154</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="146" sha1="ckq0x3f3a0q2dc4gw78t9y87wkq2uve" xml:space="preserve">* Menu
** https://www.whonix.org | HOME
** Download | DOWNLOAD
** Documentation | DOCS
** Support | HELP
** http://forums.whonix.org/c/news | NEWS</text>
      <sha1>ckq0x3f3a0q2dc4gw78t9y87wkq2uve</sha1>
    </revision>
    <revision>
      <id>55009</id>
      <parentid>37154</parentid>
      <timestamp>2020-03-05T14:35:10Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>55009</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="159" sha1="i8du2mlzv4kzw0oq9g8jol2wo16q0qm" xml:space="preserve">* Menu
** https://www.whonix.org | HOME
** Download | DOWNLOAD
** Documentation | DOCS
** FAQ | FAQ
** Support | HELP
** http://forums.whonix.org/c/news | NEWS</text>
      <sha1>i8du2mlzv4kzw0oq9g8jol2wo16q0qm</sha1>
    </revision>
    <revision>
      <id>55010</id>
      <parentid>55009</parentid>
      <timestamp>2020-03-05T14:35:51Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>55010</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="186" sha1="01ydwegfkcdhgfw9o8rdbl6gz2y7u74" xml:space="preserve">* Menu
** https://www.whonix.org | HOME
** Download | DOWNLOAD
** Documentation | DOCS
** FAQ | FAQ
** Support | HELP
** Contribute | CONTRIBUTE
** http://forums.whonix.org/c/news | NEWS</text>
      <sha1>01ydwegfkcdhgfw9o8rdbl6gz2y7u74</sha1>
    </revision>
    <revision>
      <id>61258</id>
      <parentid>55010</parentid>
      <timestamp>2020-12-08T19:18:12Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>61258</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="206" sha1="t99b2h3rr0g99fcyh1wdgia58np6vq0" xml:space="preserve">* Menu
** https://www.{{project_clearnet}} | HOME
** Download | DOWNLOAD
** Documentation | DOCS
** FAQ | FAQ
** Support | HELP
** Contribute | CONTRIBUTE
** http://forums.{{project_clearnet}}/c/news | NEWS</text>
      <sha1>t99b2h3rr0g99fcyh1wdgia58np6vq0</sha1>
    </revision>
    <revision>
      <id>61306</id>
      <parentid>61258</parentid>
      <timestamp>2020-12-09T13:18:50Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>61306</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="207" sha1="q849h56a4xrjryhcfqlzohleudojcg2" xml:space="preserve">* Menu
** https://www.{{project_clearnet}} | HOME
** Download | DOWNLOAD
** Documentation | DOCS
** FAQ | FAQ
** Support | HELP
** Contribute | CONTRIBUTE
** https://forums.{{project_clearnet}}/c/news | NEWS</text>
      <sha1>q849h56a4xrjryhcfqlzohleudojcg2</sha1>
    </revision>
    <revision>
      <id>76786</id>
      <parentid>61306</parentid>
      <timestamp>2022-01-08T09:27:15Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>76786</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="200" sha1="170qnqbljn0ztbx59q7z876rrkx9c5s" xml:space="preserve">** https://www.{{project_clearnet}} | HOME
** Download | DOWNLOAD
** Documentation | DOCS
** FAQ | FAQ
** Support | HELP
** Contribute | CONTRIBUTE
** https://forums.{{project_clearnet}}/c/news | NEWS</text>
      <sha1>170qnqbljn0ztbx59q7z876rrkx9c5s</sha1>
    </revision>
    <revision>
      <id>76787</id>
      <parentid>76786</parentid>
      <timestamp>2022-01-08T09:27:37Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>76787</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="193" sha1="gwkfwfgmviyx49gm9jfae5gpdzebx29" xml:space="preserve">* https://www.{{project_clearnet}} | HOME
* Download | DOWNLOAD
* Documentation | DOCS
* FAQ | FAQ
* Support | HELP
* Contribute | CONTRIBUTE
* https://forums.{{project_clearnet}}/c/news | NEWS</text>
      <sha1>gwkfwfgmviyx49gm9jfae5gpdzebx29</sha1>
    </revision>
    <revision>
      <id>76788</id>
      <parentid>76787</parentid>
      <timestamp>2022-01-08T09:28:58Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>76788</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="207" sha1="q849h56a4xrjryhcfqlzohleudojcg2" xml:space="preserve">* Menu
** https://www.{{project_clearnet}} | HOME
** Download | DOWNLOAD
** Documentation | DOCS
** FAQ | FAQ
** Support | HELP
** Contribute | CONTRIBUTE
** https://forums.{{project_clearnet}}/c/news | NEWS</text>
      <sha1>q849h56a4xrjryhcfqlzohleudojcg2</sha1>
    </revision>
    <revision>
      <id>76797</id>
      <parentid>76788</parentid>
      <timestamp>2022-01-08T10:12:53Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>76797</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="131" sha1="71wxpfdqyctlvn5z3l7p9aropt7t8o3" xml:space="preserve">* Menu
** Download | Download
** Documentation | Docs
** https://forums.{{project_clearnet}}/c/news | News
** Contribute | Help us!</text>
      <sha1>71wxpfdqyctlvn5z3l7p9aropt7t8o3</sha1>
    </revision>
    <revision>
      <id>76798</id>
      <parentid>76797</parentid>
      <timestamp>2022-01-08T10:14:54Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>76798</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="136" sha1="ggshng5o2vcl7cchndskmu8m5sr8r5w" xml:space="preserve">* Menu
** Download | DOWNLOAD
** Documentation | Docs
** https://forums.{{project_clearnet}}/c/news | News
** Contribute | Want to help?</text>
      <sha1>ggshng5o2vcl7cchndskmu8m5sr8r5w</sha1>
    </revision>
    <revision>
      <id>76799</id>
      <parentid>76798</parentid>
      <timestamp>2022-01-08T10:16:02Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>76799</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="130" sha1="ev23f9x5p3am0m28x3af381792i8ys1" xml:space="preserve">* Menu
** Download | DOWNLOAD
** Documentation | Docs
** https://forums.{{project_clearnet}}/c/news | News
** Contribute | Help us</text>
      <sha1>ev23f9x5p3am0m28x3af381792i8ys1</sha1>
    </revision>
    <revision>
      <id>76800</id>
      <parentid>76799</parentid>
      <timestamp>2022-01-08T10:16:20Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>76800</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="130" sha1="5rskvtk327nzaqrj6o8rrdi44efqhu3" xml:space="preserve">* Menu
** Download | Download
** Documentation | Docs
** https://forums.{{project_clearnet}}/c/news | News
** Contribute | Help us</text>
      <sha1>5rskvtk327nzaqrj6o8rrdi44efqhu3</sha1>
    </revision>
    <revision>
      <id>76801</id>
      <parentid>76800</parentid>
      <timestamp>2022-01-08T10:16:30Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>76801</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="131" sha1="84rk0zz6d3tz3gusfzlm6mov46i02hf" xml:space="preserve">* Menu
** Download | Download 
** Documentation | Docs
** https://forums.{{project_clearnet}}/c/news | News
** Contribute | Help us</text>
      <sha1>84rk0zz6d3tz3gusfzlm6mov46i02hf</sha1>
    </revision>
    <revision>
      <id>76802</id>
      <parentid>76801</parentid>
      <timestamp>2022-01-08T10:16:50Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>76802</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="132" sha1="ewyrpf9z2m0yfknq7cu4rrjkwkldxi4" xml:space="preserve">* Menu
** Download |  Download 
** Documentation | Docs
** https://forums.{{project_clearnet}}/c/news | News
** Contribute | Help us</text>
      <sha1>ewyrpf9z2m0yfknq7cu4rrjkwkldxi4</sha1>
    </revision>
    <revision>
      <id>76803</id>
      <parentid>76802</parentid>
      <timestamp>2022-01-08T10:17:02Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>76803</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="128" sha1="fpz7wnn1j8fv7dko6aa3ww6qy1t8i1u" xml:space="preserve">* Menu
** Download|Download
** Documentation | Docs
** https://forums.{{project_clearnet}}/c/news | News
** Contribute | Help us</text>
      <sha1>fpz7wnn1j8fv7dko6aa3ww6qy1t8i1u</sha1>
    </revision>
    <revision>
      <id>76804</id>
      <parentid>76803</parentid>
      <timestamp>2022-01-08T10:17:18Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>76804</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="136" sha1="2l4zotpzi6dcyavtvuwien54d0lcz1r" xml:space="preserve">* Menu
** Download | Download&amp;bnsp;
** Documentation | Docs
** https://forums.{{project_clearnet}}/c/news | News
** Contribute | Help us</text>
      <sha1>2l4zotpzi6dcyavtvuwien54d0lcz1r</sha1>
    </revision>
    <revision>
      <id>76805</id>
      <parentid>76804</parentid>
      <timestamp>2022-01-08T10:18:09Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>76805</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="133" sha1="g3522jz8k5jly35qs5ob4scekbjc0gg" xml:space="preserve">* Menu
** Download | Download​
** Documentation | Docs
** https://forums.{{project_clearnet}}/c/news | News
** Contribute | Help us</text>
      <sha1>g3522jz8k5jly35qs5ob4scekbjc0gg</sha1>
    </revision>
    <revision>
      <id>76806</id>
      <parentid>76805</parentid>
      <timestamp>2022-01-08T10:18:34Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>76806</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="131" sha1="84rk0zz6d3tz3gusfzlm6mov46i02hf" xml:space="preserve">* Menu
** Download | Download 
** Documentation | Docs
** https://forums.{{project_clearnet}}/c/news | News
** Contribute | Help us</text>
      <sha1>84rk0zz6d3tz3gusfzlm6mov46i02hf</sha1>
    </revision>
    <revision>
      <id>76807</id>
      <parentid>76806</parentid>
      <timestamp>2022-01-08T10:18:53Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>76807</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="133" sha1="gtiadkorbvdllk35pp53x3xa8ujcrng" xml:space="preserve">* Menu
** Download | Download 
** Documentation | Docs
** https://forums.{{project_clearnet}}/c/news | News
** Contribute | Help us</text>
      <sha1>gtiadkorbvdllk35pp53x3xa8ujcrng</sha1>
    </revision>
    <revision>
      <id>76943</id>
      <parentid>76807</parentid>
      <timestamp>2022-01-09T07:59:40Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>76943</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="161" sha1="4t2kupnzjrznshktw7xghq2uxggkai9" xml:space="preserve">* Menu
** Download | Download 
** Documentation | Docs
** https://forums.{{project_clearnet}}/c/news | News
** Contribute | Help us

&lt;div class="helper"&gt;&lt;/div&gt;</text>
      <sha1>4t2kupnzjrznshktw7xghq2uxggkai9</sha1>
    </revision>
    <revision>
      <id>76944</id>
      <parentid>76943</parentid>
      <timestamp>2022-01-09T08:00:37Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>76944</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="133" sha1="gtiadkorbvdllk35pp53x3xa8ujcrng" xml:space="preserve">* Menu
** Download | Download 
** Documentation | Docs
** https://forums.{{project_clearnet}}/c/news | News
** Contribute | Help us</text>
      <sha1>gtiadkorbvdllk35pp53x3xa8ujcrng</sha1>
    </revision>
    <revision>
      <id>76945</id>
      <parentid>76944</parentid>
      <timestamp>2022-01-09T08:06:10Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>76945</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="152" sha1="r5wy8puvqjzx27750n8ala8i4e2q9oj" xml:space="preserve">* Menu
** Download | Download 
** Documentation | Docs
** https://forums.{{project_clearnet}}/c/news | News
** Contribute | Help us
** Donate | Donate</text>
      <sha1>r5wy8puvqjzx27750n8ala8i4e2q9oj</sha1>
    </revision>
    <revision>
      <id>76965</id>
      <parentid>76945</parentid>
      <timestamp>2022-01-09T09:17:38Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>76965</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="173" sha1="gndex90nbuh6w7mijxuz8sljb4x49rl" xml:space="preserve">* Menu
** {{SERVER}} | Home
** Download | Download 
** Documentation | Docs
** https://forums.{{project_clearnet}}/c/news | News
** Contribute | Help us
** Donate | Donate</text>
      <sha1>gndex90nbuh6w7mijxuz8sljb4x49rl</sha1>
    </revision>
    <revision>
      <id>77014</id>
      <parentid>76965</parentid>
      <timestamp>2022-01-09T10:25:24Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>77014</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="193" sha1="lsxmtasr2e9mzq8q9pqe362p0gfrd4i" xml:space="preserve">* Menu
** {{SERVER}} | Home
** Download | Download 
** Documentation | Docs
** https://forums.{{project_clearnet}}/c/news | News
** Contribute | Help us
** Donate | Donate
** #abc | Supermenu</text>
      <sha1>lsxmtasr2e9mzq8q9pqe362p0gfrd4i</sha1>
    </revision>
    <revision>
      <id>77015</id>
      <parentid>77014</parentid>
      <timestamp>2022-01-09T10:25:57Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>77015</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="190" sha1="jrl60vxw81l3hnxmmoov5hpcsfffzlo" xml:space="preserve">* Menu
** {{SERVER}} | Home
** Download | Download 
** Documentation | Docs
** https://forums.{{project_clearnet}}/c/news | News
** Contribute | Help us
** Donate | Donate
** # | Supermenu</text>
      <sha1>jrl60vxw81l3hnxmmoov5hpcsfffzlo</sha1>
    </revision>
    <revision>
      <id>77016</id>
      <parentid>77015</parentid>
      <timestamp>2022-01-09T10:26:20Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>77016</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="199" sha1="c0v0e9h5evq6q73vztmzi7ctnwoyvgl" xml:space="preserve">* Menu
** {{SERVER}} | Home
** Download | Download 
** Documentation | Docs
** https://forums.{{project_clearnet}}/c/news | News
** Contribute | Help us
** Donate | Donate
** #supermenu | Supermenu</text>
      <sha1>c0v0e9h5evq6q73vztmzi7ctnwoyvgl</sha1>
    </revision>
    <revision>
      <id>77213</id>
      <parentid>77016</parentid>
      <timestamp>2022-01-13T16:09:03Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>77213</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="133" sha1="gtiadkorbvdllk35pp53x3xa8ujcrng" xml:space="preserve">* Menu
** Download | Download 
** Documentation | Docs
** https://forums.{{project_clearnet}}/c/news | News
** Contribute | Help us</text>
      <sha1>gtiadkorbvdllk35pp53x3xa8ujcrng</sha1>
    </revision>
    <revision>
      <id>85745</id>
      <parentid>77213</parentid>
      <timestamp>2022-08-12T15:24:02Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>remove-trailing-spaces</comment>
      <origin>85745</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="130" sha1="5rskvtk327nzaqrj6o8rrdi44efqhu3" xml:space="preserve">* Menu
** Download | Download
** Documentation | Docs
** https://forums.{{project_clearnet}}/c/news | News
** Contribute | Help us</text>
      <sha1>5rskvtk327nzaqrj6o8rrdi44efqhu3</sha1>
    </revision>
  </page>
  <page>
    <title>Template:Note</title>
    <ns>10</ns>
    <id>9</id>
    <revision>
      <id>22</id>
      <timestamp>2013-06-25T23:26:45Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <comment>testing</comment>
      <origin>22</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="285" sha1="6qevdf7dbh69e3z130t7fwlmnzvdtzu" xml:space="preserve">{{#if: {{{1|&lt;noinclude&gt;demo&lt;/noinclude&gt;}}} | &lt;div class="note note-{{#switch:{{{2|}}}
 |gotcha=error
 |=info
 |#default={{{2|}}}
}}"&gt;{{{1}}}&lt;/div&gt; | [[File:Bulbgraph.png|18px|Note|link=]]&amp;nbsp;'''Note''': }}&lt;noinclude&gt;
{{documentation}}
[[Category:Templates|{{PAGENAME}}]]
&lt;/noinclude&gt;</text>
      <sha1>6qevdf7dbh69e3z130t7fwlmnzvdtzu</sha1>
    </revision>
    <revision>
      <id>23</id>
      <parentid>22</parentid>
      <timestamp>2013-06-25T23:37:28Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>23</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="207" sha1="h3q7tw546q9uth7geoji8e0m65y7k8f" xml:space="preserve">{{#if: {{{1|&lt;noinclude&gt;demo&lt;/noinclude&gt;}}} | &lt;div class="note note-{{#switch:{{{2|}}}
 |gotcha=error
 |=info
 |#default={{{2|}}}
}}"&gt;{{{1}}}&lt;/div&gt; | [[File:Bulbgraph.png|18px|Note|link=]]&amp;nbsp;'''Note''': }}</text>
      <sha1>h3q7tw546q9uth7geoji8e0m65y7k8f</sha1>
    </revision>
    <revision>
      <id>25</id>
      <parentid>23</parentid>
      <timestamp>2013-06-25T23:41:34Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>25</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="285" sha1="6qevdf7dbh69e3z130t7fwlmnzvdtzu" xml:space="preserve">{{#if: {{{1|&lt;noinclude&gt;demo&lt;/noinclude&gt;}}} | &lt;div class="note note-{{#switch:{{{2|}}}
 |gotcha=error
 |=info
 |#default={{{2|}}}
}}"&gt;{{{1}}}&lt;/div&gt; | [[File:Bulbgraph.png|18px|Note|link=]]&amp;nbsp;'''Note''': }}&lt;noinclude&gt;
{{documentation}}
[[Category:Templates|{{PAGENAME}}]]
&lt;/noinclude&gt;</text>
      <sha1>6qevdf7dbh69e3z130t7fwlmnzvdtzu</sha1>
    </revision>
    <revision>
      <id>102343</id>
      <parentid>25</parentid>
      <timestamp>2024-11-30T20:15:34Z</timestamp>
      <contributor>
        <username>Nurmagoz</username>
        <id>4391</id>
      </contributor>
      <origin>102343</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="267" sha1="ezy5317q29h1pcq6kx2vp1h2gppe6gi" xml:space="preserve">{{#if: {{{1|&lt;noinclude&gt;demo&lt;/noinclude&gt;}}} | &lt;div class="note note-{{#switch:{{{2|}}}
 |gotcha=error
 |=info
 |#default={{{2|}}}
}}"&gt;{{{1}}}&lt;/div&gt; | [[File:Bulbgraph.png|18px|Note|link=]]&amp;nbsp;'''Note''': }}&lt;noinclude&gt;
[[Category:Templates|{{PAGENAME}}]]
&lt;/noinclude&gt;</text>
      <sha1>ezy5317q29h1pcq6kx2vp1h2gppe6gi</sha1>
    </revision>
  </page>
  <page>
    <title>File:Bulbgraph.png</title>
    <ns>6</ns>
    <id>10</id>
    <revision>
      <id>24</id>
      <timestamp>2013-06-25T23:39:41Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>24</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="0" sha1="phoiac9h4m842xq45sp7s6u21eteeq1" xml:space="preserve" />
      <sha1>phoiac9h4m842xq45sp7s6u21eteeq1</sha1>
    </revision>
    <upload>
      <timestamp>2013-06-25T23:39:41Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <comment deleted="deleted" />
      <filename>Bulbgraph.png</filename>
      <src>https://www.whonix.org/w/images/6/60/Bulbgraph.png</src>
      <size>2277</size>
      <sha1base36>cv1pmuwj4fw0ojlmtiadl2pqghuz9oo</sha1base36>
      <rel>6/60/Bulbgraph.png</rel>
      <contents encoding="base64">iVBORw0KGgoAAAANSUhEUgAAABcAAAAcCAYAAACK7SRjAAAGVUlEQVRIx52WC1BUZRTHL1mUCTVW
ygCKL1IslVnFTFQeuwguroCt4Bt8DFqWhCmrBIgigWWBFCIKsmX5wiIeKhABUkopsEgiD2mABZTH
AkOswnL33vvvLM40kzJBfjNnzs693/l95/zPud8swwyxgEYmNiaJPAw2JvJw4qT9Bz6fr1BEirb6
Kczo2WjDPsXuvcz/WlUV9xhTo5VM6oWrph4yX6mj49vHnSSzVO4rZt6XSqe3SJzeLBE7OCZ6yuTO
ra3aUbsCdzNNze3DgzWd3KCPCj89xUW8OHLrttm1Kd+4orR8CxqbNqNBvQY3StxwLOkNrF87rXae
7byg3btCxj+qFsMfsPPdwNddxXYJJ5Nc29s7DkAQLlHcrwCXS/4c2VEI2AZ1kxhh4dN1jg62F6I+
ibFmGNvBeAFdT0L9NwYyySnfv+awaO7JY8clOt3AUQKqwAka6PkucLyafAn5n8HpleCFQPRqVyE6
eqp+8ZL58adP5ZryPG+AGz3WQDDfHGthxGLJqoD352q6uiLB81lk9wnSS74LAtdBvokOu0Y+nSr6
kmwH7rVJsG79lHvuLmslBs4TmdNDowD/A2Pemm+Vkf/zcgqKI2gJ9Fw3BgQteE4Loa8ZHFeDARQT
nLLnTtOeIJLIDd9fnM07LBJd/Pr0xRf/BQc6BzPfsHKvtbf35Dtt7X4UlAy9UE4QzeABurbf8eDu
fgy074NOm0ny5FECp2ifAgK/Hnfr3oBsxaS6iIjkmY9l/QjutGi5vSLQpp5lt1PgtwRWkbWS7g/R
92csHrScR3/Td9DVh5Pu2ZTxCQoLAfSb0N0zB+v9rDSbNgYveQJuWA6OS8ShwdNaWNaX4CkUWAYI
zWD5Tgj1n0LfWYCBxh8g3PmI3tHkUHUQwsjWoadvBjZvsWhzc1nz9pBwqcxDtP29qTV/aX0o43iy
IgqsI23rwWqV6K/dDt3NzeCb4gmeRZZISQST96KmWmOV3PzPrZs/nD7kfCuCY81clk4rqqpeOjjL
vGGuhUrw+gZq6m2wtxXgbh+gMfyFJDlPFkMWSHvd8dv1yXB1tFEpU1Ith4TXNTwcPd9uTnhiwhyO
50MJnkbjV0qylILDb+CqPwNH8rD4kZr8NY1kNGm/HWy/Aw7tG8u7LHQMr75TP2pIeMG1Jma5VD7D
bZllRdmtNRD0qSQJjZxQCh7Xob9LB6qpmVwGWP1J9CMYep0XCtPMILGboPrAL3jG78W3hv7sDRNT
Val5ZrFkoe8mP9H927f2UfapNG4ZBM8GW7MHXON+sMJZeh4Cfa87ruWaY6X4lRY3R08vin/mP++V
yIivmPikb43Fzs575B7T24vz3yHN6RAowVb7QWhYhgGdD3Q9IlxNexlSezO1p1zu36fjTGkmjYa9
uLbtfJ+5ci3N2NN97Uc7vcf1apvsSIZIsH8sBHfnOXDqF9H2hzFWy8f/tdrn3W2UsbHhCwf6R3an
R34ewoQfTp22aYWlqrXEBPoHH0Aofgt88ShwN0ehOucFSJ2tCi6nqyweSdrO/K91KOqEudTBMic3
2UToN1wJv86FcN0IfYXGOB9rDFtbi+yUCzdNR3SPP74OH/rCwnnJ0vQPfWVC1CEplCE2OPbxCwhf
Owl21uNgZTXrp7TM715inmbFx0WYi+zs8vco9kN54SzOnzqLsLBdeMfTG5aTrWFhMSW7IDvR9Kng
R458Zmlvb39TsVeBqOgoHDx4kO6PLXB2dqasrWBmNv5yQUHBmKeSJSYmxsLW1rbc398fSqUSZ86c
oczDIJPJMGHCBEycOPFqdnb2q/SOuXTpEnPjxg2mubmZ6e7uHh6enJw8ViQSpQUFBXH0G3FxcQgI
CICHh4cBbKigJzMzMykvLy+6qKgooqKi4mO1Wu3R09Pz7LBwQ7kEmrlgwYIcLy8vYceOHSAPGxsb
SCQSJCQkICsrC1euXAHJg/Ly8n7K/DjBnx8Wnp+f/+hvRlSUDcmTa2Ji0krW6eTk1E2VaNPT0/tI
jr6cnJyHhYWFvSqVqoYyj+zq6np+RLpTyYMVxMbGmsvl8nkbNmxwyMjIkJSVla0g2KqqqipvspV1
dXWy2traKQ0NDSYdHR1GI24sy7JMaGgo4+Liwvj4+DDnzp0bbF5paSlTWVk5aARmampqmMbGRkaj
0fwT+ze2H2xSyyGWFQAAAABJRU5ErkJggg==
      </contents>
    </upload>
  </page>
  <page>
    <title>File:18px-Attention niels epting.svg.png</title>
    <ns>6</ns>
    <id>11</id>
    <revision>
      <id>26</id>
      <timestamp>2013-06-25T23:44:18Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>26</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="0" sha1="phoiac9h4m842xq45sp7s6u21eteeq1" xml:space="preserve" />
      <sha1>phoiac9h4m842xq45sp7s6u21eteeq1</sha1>
    </revision>
    <upload>
      <timestamp>2013-06-25T23:44:18Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <comment deleted="deleted" />
      <filename>18px-Attention_niels_epting.svg.png</filename>
      <src>https://www.whonix.org/w/images/4/4b/18px-Attention_niels_epting.svg.png</src>
      <size>810</size>
      <sha1base36>4sjgl22m8ect5fm1h7nglg3jy4vixpr</sha1base36>
      <rel>4/4b/18px-Attention_niels_epting.svg.png</rel>
      <contents encoding="base64">iVBORw0KGgoAAAANSUhEUgAAABIAAAASCAMAAABhEH5lAAABUFBMVEUAAAAzAAAuAAArAABYAAAz
AAA6AAA4AAA2AAA8AABvAgBvBQByBQBzBwJyBQCFBACFBACHBACNEg6QGBSNFBCPGhaYBACVBACZ
DQmYDQmeGhehHhisNzShBQCsODOuBgCvBgCwBgCyBgCrGxatIx6uJB+/PDfCOzfDQDzGQj68UE3S
BwDUBwDVBwD/CAD2CAD4CADhV1LsBwD/GRH/GhP/GxTjWVTcBwD/MizdGRO/BQD/R0K1BQDrgX3q
gX7sR0H/XFifBQDJLir/cWz/d3KLBQDaWlWCBQD/hIG5QT5wAwD/l5P/mJX/m5fMa2ewVVL/qKbF
fXv/tLL/uLb/ubepZmT/xsTAjYz/ysioeXj/29ojAQCpionAnp3mxcTgxMPhxMMoERDEr66smpq0
rKwoJCQAAAAQEBAkJCQ3NzdLS0teXl5ycnKFhYWYmJirq6vdWxDlAAAAZnRSTlMACgsMHR4fICEi
Z2dnaGl3eXl9fn+AiouMjZGSmZqanZ2enqCio6usrq6wvb29y8zMzs7Ozs7P0dLU1tbY2NnZ2tzc
3t/g4eLi4+Xm5+fo6ert7e7u7/Hy8vP29/f39/j4+fr7/f4qNaUeAAAAzklEQVQYGQXByy4DUQAA
0HNnrqmKNwsLIhEk+P9PYWUhQWxEakq1c1/OCWA2O9w1LtIGAvrju7OI/PG0KATizUM0BGEtPT5n
ve76PtQ6P9guqxpO05fO8W3NOafWWs653h6J86taMTWbBJfLGPcLTE0pcDLE/ZZgaHICB3GngHUz
FbATawKtmRJocVVAyf2mgN+4zAHk7q9AHWNed+Al/lUoqVu/A8NWB95SZ7EEp+db8D3q+ZkPWH2u
ML5XAf3eRQD1dWwEMMS9weYnT/AP96xp/r/HAwUAAAAASUVORK5CYII=
      </contents>
    </upload>
  </page>
  <page>
    <title>File:22px-Appunti architetto franc 01.svg.png</title>
    <ns>6</ns>
    <id>12</id>
    <revision>
      <id>27</id>
      <timestamp>2013-06-25T23:44:31Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>27</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="0" sha1="phoiac9h4m842xq45sp7s6u21eteeq1" xml:space="preserve" />
      <sha1>phoiac9h4m842xq45sp7s6u21eteeq1</sha1>
    </revision>
    <upload>
      <timestamp>2013-06-25T23:44:31Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <comment deleted="deleted" />
      <filename>22px-Appunti_architetto_franc_01.svg.png</filename>
      <src>https://www.whonix.org/w/images/0/0f/22px-Appunti_architetto_franc_01.svg.png</src>
      <size>1114</size>
      <sha1base36>nfvz7kv3tsue3js6mn5vtvc56ar8xsc</sha1base36>
      <rel>0/0f/22px-Appunti_architetto_franc_01.svg.png</rel>
      <contents encoding="base64">iVBORw0KGgoAAAANSUhEUgAAABYAAAAcCAYAAABlL09dAAAD/0lEQVQYGaXBy2+UVRjA4d97vuvM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      </contents>
    </upload>
  </page>
  <page>
    <title>File:24px-Attention niels epting.svg.png</title>
    <ns>6</ns>
    <id>13</id>
    <revision>
      <id>28</id>
      <timestamp>2013-06-25T23:44:40Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>28</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="0" sha1="phoiac9h4m842xq45sp7s6u21eteeq1" xml:space="preserve" />
      <sha1>phoiac9h4m842xq45sp7s6u21eteeq1</sha1>
    </revision>
    <upload>
      <timestamp>2013-06-25T23:44:40Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <comment deleted="deleted" />
      <filename>24px-Attention_niels_epting.svg.png</filename>
      <src>https://www.whonix.org/w/images/7/7f/24px-Attention_niels_epting.svg.png</src>
      <size>1081</size>
      <sha1base36>9oshayxoxhojtrqyswh6orhhamhhgsp</sha1base36>
      <rel>7/7f/24px-Attention_niels_epting.svg.png</rel>
      <contents encoding="base64">iVBORw0KGgoAAAANSUhEUgAAABgAAAAYCAMAAADXqc3KAAABtlBMVEUAAAAAAAAAAAAxAAA7AAA5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      </contents>
    </upload>
  </page>
  <page>
    <title>Template:Header</title>
    <ns>10</ns>
    <id>14</id>
    <revision>
      <id>31</id>
      <timestamp>2013-06-27T15:11:48Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <comment>Created page with "&lt;!--Blank for now--&gt;"</comment>
      <origin>31</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="20" sha1="5uaw0vkkohacmk3h47991c0nx1r9gh1" xml:space="preserve">&lt;!--Blank for now--&gt;</text>
      <sha1>5uaw0vkkohacmk3h47991c0nx1r9gh1</sha1>
    </revision>
    <revision>
      <id>172</id>
      <parentid>31</parentid>
      <timestamp>2013-07-01T17:18:51Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>172</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="629" sha1="lkyqpw1pvow235clq3nrjhpdv6vtgke" xml:space="preserve">&lt;!--Blank for now--&gt;

'''Still migrating from sourceforge...'''

Website questions, shell account requests, and wiki permissions requests to fortasse@riseup.net &lt;ref&gt;https://whonix.org/fortasse.asc&lt;/ref&gt;

Whonix-specific questions to adrelanos at riseup dot net &lt;ref&gt;https://whonix.org/adrelanos.asc&lt;/ref&gt;

User account creation has been disabled for now due to automatic spam bots. Please mail fortasse or adrelanos for new user accounts.

'''Old docs:'''

In mediawiki:
https://github.com/adrelanos/Whonix-documentation/tree/master/mediawiki

and markdown:
https://github.com/adrelanos/Whonix-documentation

{{reflist|close=1}}</text>
      <sha1>lkyqpw1pvow235clq3nrjhpdv6vtgke</sha1>
    </revision>
    <revision>
      <id>194</id>
      <parentid>172</parentid>
      <timestamp>2013-07-02T18:16:02Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>194</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="670" sha1="shj2l0cjw5rjdffyc4rxjjv9tgqwtea" xml:space="preserve">&lt;!--Blank for now--&gt;

'''Still migrating from sourceforge... You can help so this header can go away!'''

Website questions, shell account requests, and wiki permissions requests to fortasse@riseup.net &lt;ref&gt;https://whonix.org/fortasse.asc&lt;/ref&gt;

Whonix-specific questions to adrelanos at riseup dot net &lt;ref&gt;https://whonix.org/adrelanos.asc&lt;/ref&gt;

User account creation has been disabled for now due to automatic spam bots. Please mail fortasse or adrelanos for new user accounts.

'''Old docs:'''

In mediawiki:
https://github.com/adrelanos/Whonix-documentation/tree/master/mediawiki

and markdown:
https://github.com/adrelanos/Whonix-documentation

{{reflist|close=1}}</text>
      <sha1>shj2l0cjw5rjdffyc4rxjjv9tgqwtea</sha1>
    </revision>
    <revision>
      <id>267</id>
      <parentid>194</parentid>
      <timestamp>2013-07-03T14:35:41Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>267</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="809" sha1="jq1or3nq40cfjizs0acxqmrbpxsv4xr" xml:space="preserve">[https://whonix.org/{{PAGENAME}} TLS (secure)] | [http://whonix.org.nyud.net/{{PAGENAME}} CoralCDN] | [http://maybe_soon.onion/{{PAGENAME}} Tor Hidden Service]

'''Still migrating from sourceforge... You can help so this header can go away!'''

Website questions, shell account requests, and wiki permissions requests to fortasse@riseup.net &lt;ref&gt;https://whonix.org/fortasse.asc&lt;/ref&gt;

Whonix-specific questions to adrelanos at riseup dot net &lt;ref&gt;https://whonix.org/adrelanos.asc&lt;/ref&gt;

User account creation has been disabled for now due to automatic spam bots. Please mail fortasse or adrelanos for new user accounts.

'''Old docs:'''

In mediawiki:
https://github.com/adrelanos/Whonix-documentation/tree/master/mediawiki

and markdown:
https://github.com/adrelanos/Whonix-documentation

{{reflist|close=1}}</text>
      <sha1>jq1or3nq40cfjizs0acxqmrbpxsv4xr</sha1>
    </revision>
    <revision>
      <id>268</id>
      <parentid>267</parentid>
      <timestamp>2013-07-03T14:38:14Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>268</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="824" sha1="she0qchtu5psf3283uk5h3f8qno3152" xml:space="preserve">[https://whonix.org/wiki/{{PAGENAME}} TLS (secure)] | [http://whonix.org.nyud.net/wiki/{{PAGENAME}} CoralCDN] | [http://maybe_soon.onion/wiki/{{PAGENAME}} Tor Hidden Service]

'''Still migrating from sourceforge... You can help so this header can go away!'''

Website questions, shell account requests, and wiki permissions requests to fortasse@riseup.net &lt;ref&gt;https://whonix.org/fortasse.asc&lt;/ref&gt;

Whonix-specific questions to adrelanos at riseup dot net &lt;ref&gt;https://whonix.org/adrelanos.asc&lt;/ref&gt;

User account creation has been disabled for now due to automatic spam bots. Please mail fortasse or adrelanos for new user accounts.

'''Old docs:'''

In mediawiki:
https://github.com/adrelanos/Whonix-documentation/tree/master/mediawiki

and markdown:
https://github.com/adrelanos/Whonix-documentation

{{reflist|close=1}}</text>
      <sha1>she0qchtu5psf3283uk5h3f8qno3152</sha1>
    </revision>
    <revision>
      <id>269</id>
      <parentid>268</parentid>
      <timestamp>2013-07-03T14:38:42Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>269</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="854" sha1="sc26indl6dva2o6a6jp34a1jvqa2gho" xml:space="preserve">[https://whonix.org/wiki/index.php/{{PAGENAME}} TLS (secure)] | [http://whonix.org.nyud.net/wiki/index.php/{{PAGENAME}} CoralCDN] | [http://maybe_soon.onion/wiki/index.php/{{PAGENAME}} Tor Hidden Service]

'''Still migrating from sourceforge... You can help so this header can go away!'''

Website questions, shell account requests, and wiki permissions requests to fortasse@riseup.net &lt;ref&gt;https://whonix.org/fortasse.asc&lt;/ref&gt;

Whonix-specific questions to adrelanos at riseup dot net &lt;ref&gt;https://whonix.org/adrelanos.asc&lt;/ref&gt;

User account creation has been disabled for now due to automatic spam bots. Please mail fortasse or adrelanos for new user accounts.

'''Old docs:'''

In mediawiki:
https://github.com/adrelanos/Whonix-documentation/tree/master/mediawiki

and markdown:
https://github.com/adrelanos/Whonix-documentation

{{reflist|close=1}}</text>
      <sha1>sc26indl6dva2o6a6jp34a1jvqa2gho</sha1>
    </revision>
    <revision>
      <id>270</id>
      <parentid>269</parentid>
      <timestamp>2013-07-03T14:48:55Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>270</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="857" sha1="bsiqrh3oz71gv1wkzfgydr2vbeo7md7" xml:space="preserve">[https://whonix.org/wiki/index.php/{{PAGENAME}}/ TLS (secure)] | [http://whonix.org.nyud.net/wiki/index.php/{{PAGENAME}}/ CoralCDN] | [http://maybe_soon.onion/wiki/index.php/{{PAGENAME}}/ Tor Hidden Service]

'''Still migrating from sourceforge... You can help so this header can go away!'''

Website questions, shell account requests, and wiki permissions requests to fortasse@riseup.net &lt;ref&gt;https://whonix.org/fortasse.asc&lt;/ref&gt;

Whonix-specific questions to adrelanos at riseup dot net &lt;ref&gt;https://whonix.org/adrelanos.asc&lt;/ref&gt;

User account creation has been disabled for now due to automatic spam bots. Please mail fortasse or adrelanos for new user accounts.

'''Old docs:'''

In mediawiki:
https://github.com/adrelanos/Whonix-documentation/tree/master/mediawiki

and markdown:
https://github.com/adrelanos/Whonix-documentation

{{reflist|close=1}}</text>
      <sha1>bsiqrh3oz71gv1wkzfgydr2vbeo7md7</sha1>
    </revision>
    <revision>
      <id>271</id>
      <parentid>270</parentid>
      <timestamp>2013-07-03T14:55:35Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>271</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="862" sha1="3g8thg6mnl2ll0q8hche9rcsy6xmqjc" xml:space="preserve">[https://whonix.org/wiki/index.php/{{BASEPAGENAMEE}}/ TLS (secure)] | [http://whonix.org.nyud.net/wiki/index.php/{{PAGENAME}}/ CoralCDN] | [http://maybe_soon.onion/wiki/index.php/{{PAGENAME}}/ Tor Hidden Service]

'''Still migrating from sourceforge... You can help so this header can go away!'''

Website questions, shell account requests, and wiki permissions requests to fortasse@riseup.net &lt;ref&gt;https://whonix.org/fortasse.asc&lt;/ref&gt;

Whonix-specific questions to adrelanos at riseup dot net &lt;ref&gt;https://whonix.org/adrelanos.asc&lt;/ref&gt;

User account creation has been disabled for now due to automatic spam bots. Please mail fortasse or adrelanos for new user accounts.

'''Old docs:'''

In mediawiki:
https://github.com/adrelanos/Whonix-documentation/tree/master/mediawiki

and markdown:
https://github.com/adrelanos/Whonix-documentation

{{reflist|close=1}}</text>
      <sha1>3g8thg6mnl2ll0q8hche9rcsy6xmqjc</sha1>
    </revision>
    <revision>
      <id>272</id>
      <parentid>271</parentid>
      <timestamp>2013-07-03T14:56:11Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>272</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="872" sha1="3v3jo0miltkndw5608vv5cquyrqti6h" xml:space="preserve">[https://whonix.org/wiki/index.php/{{BASEPAGENAMEE}}/ TLS (secure)] | [http://whonix.org.nyud.net/wiki/index.php/{{BASEPAGENAMEE}}/ CoralCDN] | [http://maybe_soon.onion/wiki/index.php/{{BASEPAGENAMEE}}/ Tor Hidden Service]

'''Still migrating from sourceforge... You can help so this header can go away!'''

Website questions, shell account requests, and wiki permissions requests to fortasse@riseup.net &lt;ref&gt;https://whonix.org/fortasse.asc&lt;/ref&gt;

Whonix-specific questions to adrelanos at riseup dot net &lt;ref&gt;https://whonix.org/adrelanos.asc&lt;/ref&gt;

User account creation has been disabled for now due to automatic spam bots. Please mail fortasse or adrelanos for new user accounts.

'''Old docs:'''

In mediawiki:
https://github.com/adrelanos/Whonix-documentation/tree/master/mediawiki

and markdown:
https://github.com/adrelanos/Whonix-documentation

{{reflist|close=1}}</text>
      <sha1>3v3jo0miltkndw5608vv5cquyrqti6h</sha1>
    </revision>
    <revision>
      <id>273</id>
      <parentid>272</parentid>
      <timestamp>2013-07-03T14:57:24Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>273</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="869" sha1="4cqv1ts9vooigo0okt8jmr0f0t0fn97" xml:space="preserve">[https://whonix.org/wiki/index.php/{{BASEPAGENAMEE}} TLS (secure)] | [http://whonix.org.nyud.net/wiki/index.php/{{BASEPAGENAMEE}} CoralCDN] | [http://maybe_soon.onion/wiki/index.php/{{BASEPAGENAMEE}} Tor Hidden Service]

'''Still migrating from sourceforge... You can help so this header can go away!'''

Website questions, shell account requests, and wiki permissions requests to fortasse@riseup.net &lt;ref&gt;https://whonix.org/fortasse.asc&lt;/ref&gt;

Whonix-specific questions to adrelanos at riseup dot net &lt;ref&gt;https://whonix.org/adrelanos.asc&lt;/ref&gt;

User account creation has been disabled for now due to automatic spam bots. Please mail fortasse or adrelanos for new user accounts.

'''Old docs:'''

In mediawiki:
https://github.com/adrelanos/Whonix-documentation/tree/master/mediawiki

and markdown:
https://github.com/adrelanos/Whonix-documentation

{{reflist|close=1}}</text>
      <sha1>4cqv1ts9vooigo0okt8jmr0f0t0fn97</sha1>
    </revision>
    <revision>
      <id>274</id>
      <parentid>273</parentid>
      <timestamp>2013-07-03T14:58:10Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>274</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="869" sha1="tpsj321k5vsy7t3vc9gw9atsumpg9l8" xml:space="preserve">[https://whonix.org/wiki/index.php/{{FULLPAGENAMEE}} TLS (secure)] | [http://whonix.org.nyud.net/wiki/index.php/{{FULLPAGENAMEE}} CoralCDN] | [http://maybe_soon.onion/wiki/index.php/{{FULLPAGENAMEE}} Tor Hidden Service]

'''Still migrating from sourceforge... You can help so this header can go away!'''

Website questions, shell account requests, and wiki permissions requests to fortasse@riseup.net &lt;ref&gt;https://whonix.org/fortasse.asc&lt;/ref&gt;

Whonix-specific questions to adrelanos at riseup dot net &lt;ref&gt;https://whonix.org/adrelanos.asc&lt;/ref&gt;

User account creation has been disabled for now due to automatic spam bots. Please mail fortasse or adrelanos for new user accounts.

'''Old docs:'''

In mediawiki:
https://github.com/adrelanos/Whonix-documentation/tree/master/mediawiki

and markdown:
https://github.com/adrelanos/Whonix-documentation

{{reflist|close=1}}</text>
      <sha1>tpsj321k5vsy7t3vc9gw9atsumpg9l8</sha1>
    </revision>
    <revision>
      <id>275</id>
      <parentid>274</parentid>
      <timestamp>2013-07-03T15:08:53Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>275</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="963" sha1="gyg3ekqb60l5amicl97iuui1632gmzf" xml:space="preserve">[https://whonix.org/wiki/index.php/{{FULLPAGENAMEE}} TLS (secure)] | [http://whonix.org.nyud.net/wiki/index.php/{{FULLPAGENAMEE}} CoralCDN] | [http://maybe_soon.onion/wiki/index.php/{{FULLPAGENAMEE}} Tor Hidden Service]
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p
--&gt;

'''Still migrating from sourceforge... You can help so this header can go away!'''

Website questions, shell account requests, and wiki permissions requests to fortasse@riseup.net &lt;ref&gt;https://whonix.org/fortasse.asc&lt;/ref&gt;

Whonix-specific questions to adrelanos at riseup dot net &lt;ref&gt;https://whonix.org/adrelanos.asc&lt;/ref&gt;

User account creation has been disabled for now due to automatic spam bots. Please mail fortasse or adrelanos for new user accounts.

'''Old docs:'''

In mediawiki:
https://github.com/adrelanos/Whonix-documentation/tree/master/mediawiki

and markdown:
https://github.com/adrelanos/Whonix-documentation

{{reflist|close=1}}</text>
      <sha1>gyg3ekqb60l5amicl97iuui1632gmzf</sha1>
    </revision>
    <revision>
      <id>327</id>
      <parentid>275</parentid>
      <timestamp>2013-07-03T20:42:49Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>327</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="969" sha1="2yqhaa042hhaigm7qen268n0guynqre" xml:space="preserve">[https://whonix.org/wiki/index.php/{{FULLPAGENAMEE}} TLS (secure)] | [http://whonix.org.nyud.net/wiki/index.php/{{FULLPAGENAMEE}} CoralCDN] | [http://zo7fksnun4b4v4jv.onion/wiki/index.php/{{FULLPAGENAMEE}} Tor Hidden Service]
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p
--&gt;

'''Still migrating from sourceforge... You can help so this header can go away!'''

Website questions, shell account requests, and wiki permissions requests to fortasse@riseup.net &lt;ref&gt;https://whonix.org/fortasse.asc&lt;/ref&gt;

Whonix-specific questions to adrelanos at riseup dot net &lt;ref&gt;https://whonix.org/adrelanos.asc&lt;/ref&gt;

User account creation has been disabled for now due to automatic spam bots. Please mail fortasse or adrelanos for new user accounts.

'''Old docs:'''

In mediawiki:
https://github.com/adrelanos/Whonix-documentation/tree/master/mediawiki

and markdown:
https://github.com/adrelanos/Whonix-documentation

{{reflist|close=1}}</text>
      <sha1>2yqhaa042hhaigm7qen268n0guynqre</sha1>
    </revision>
    <revision>
      <id>329</id>
      <parentid>327</parentid>
      <timestamp>2013-07-03T22:10:57Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>329</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1428" sha1="p3pe5f8130pdl55czqseqrwawwm2n70" xml:space="preserve">[https://whonix.org/wiki/index.php/{{FULLPAGENAMEE}} TLS (secure)] | [http://whonix.org.nyud.net/wiki/index.php/{{FULLPAGENAMEE}} CoralCDN] | [http://zo7fksnun4b4v4jv.onion/wiki/index.php/{{FULLPAGENAMEE}} Tor Hidden Service]
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p
--&gt;

[https://whonix.org/wiki/index.php/{{FULLPAGENAMEE}} .ssl] | [http://whonix.org.nyud.net/wiki/index.php/{{FULLPAGENAMEE}} .cdn] | [http://zo7fksnun4b4v4jv.onion/wiki/index.php/{{FULLPAGENAMEE}} .onion] | [http://zo7fksnun4b4v4jv.onion.tor2web.org/wiki/index.php/{{FULLPAGENAMEE}} .tor2web] | [http://zo7fksnun4b4v4jv.onion.to/wiki/index.php/{{FULLPAGENAMEE}} .to]
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p
--&gt;

'''Still migrating from sourceforge... You can help so this header can go away!'''

Website questions, shell account requests, and wiki permissions requests to fortasse@riseup.net &lt;ref&gt;https://whonix.org/fortasse.asc&lt;/ref&gt;

Whonix-specific questions to adrelanos at riseup dot net &lt;ref&gt;https://whonix.org/adrelanos.asc&lt;/ref&gt;

User account creation has been disabled for now due to automatic spam bots. Please mail fortasse or adrelanos for new user accounts.

'''Old docs:'''

In mediawiki:
https://github.com/adrelanos/Whonix-documentation/tree/master/mediawiki

and markdown:
https://github.com/adrelanos/Whonix-documentation

{{reflist|close=1}}</text>
      <sha1>p3pe5f8130pdl55czqseqrwawwm2n70</sha1>
    </revision>
    <revision>
      <id>381</id>
      <parentid>329</parentid>
      <timestamp>2013-07-05T21:37:09Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <origin>381</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1446" sha1="cex57vtxtkmjzzx6wtk5s2te1kbr0jq" xml:space="preserve">[https://whonix.org/wiki/index.php/{{FULLPAGENAMEE}} TLS (secure)] | [http://whonix.org.nyud.net/wiki/index.php/{{FULLPAGENAMEE}} CoralCDN] | [http://zo7fksnun4b4v4jv.onion/wiki/index.php/{{FULLPAGENAMEE}} Tor Hidden Service]
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p
--&gt;

[https://whonix.org/wiki/index.php/{{FULLPAGENAMEE}} .ssl] | [http://whonix.org.nyud.net/wiki/index.php/{{FULLPAGENAMEE}} .cdn] | [http://zo7fksnun4b4v4jv.onion/wiki/index.php/{{FULLPAGENAMEE}} .onion] | [http://zo7fksnun4b4v4jv.onion.tor2web.org/wiki/index.php/{{FULLPAGENAMEE}} .tor2web] | [http://zo7fksnun4b4v4jv.onion.to/wiki/index.php/{{FULLPAGENAMEE}} .to]
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p
--&gt;

'''Still migrating from sourceforge... You can help so this header can go away!'''

Website questions, shell account requests, and wiki permissions requests to fortasse@riseup.net &lt;ref&gt;https://whonix.org/fortasse.asc&lt;/ref&gt;

Whonix-specific questions to adrelanos at riseup dot net &lt;ref&gt;https://whonix.org/adrelanos.asc&lt;/ref&gt;

User account creation has been disabled for now due to automatic spam bots. Please mail fortasse or adrelanos for new user accounts.

'''Old docs:'''

In mediawiki format:
https://github.com/adrelanos/Whonix-documentation/tree/master/mediawiki

and old markdown format:
https://github.com/adrelanos/Whonix-documentation

{{reflist|close=1}}</text>
      <sha1>cex57vtxtkmjzzx6wtk5s2te1kbr0jq</sha1>
    </revision>
    <revision>
      <id>432</id>
      <parentid>381</parentid>
      <timestamp>2013-07-06T16:40:27Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>432</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1125" sha1="qg1ah8thoy28h2ffbapzxnsydqpzgwk" xml:space="preserve">[https://whonix.org/wiki/index.php/{{FULLPAGENAMEE}} .ssl] | [http://whonix.org.nyud.net/wiki/index.php/{{FULLPAGENAMEE}} .cdn] | [http://zo7fksnun4b4v4jv.onion/wiki/index.php/{{FULLPAGENAMEE}} .onion] | [http://zo7fksnun4b4v4jv.onion.tor2web.org/wiki/index.php/{{FULLPAGENAMEE}} .tor2web] | [http://zo7fksnun4b4v4jv.onion.to/wiki/index.php/{{FULLPAGENAMEE}} .to]
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p
--&gt;

'''Still migrating from sourceforge... You can help so this header can go away!'''

Website questions, shell account requests, and wiki permissions requests to fortasse@riseup.net &lt;ref&gt;https://whonix.org/fortasse.asc&lt;/ref&gt;

Whonix-specific questions to adrelanos at riseup dot net &lt;ref&gt;https://whonix.org/adrelanos.asc&lt;/ref&gt;

User account creation has been disabled for now due to automatic spam bots. Please mail fortasse or adrelanos for new user accounts.

'''Old docs:'''

In mediawiki format:
https://github.com/adrelanos/Whonix-documentation/tree/master/mediawiki

and old markdown format:
https://github.com/adrelanos/Whonix-documentation

{{reflist|close=1}}</text>
      <sha1>qg1ah8thoy28h2ffbapzxnsydqpzgwk</sha1>
    </revision>
    <revision>
      <id>677</id>
      <parentid>432</parentid>
      <timestamp>2013-07-09T23:50:28Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>677</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1217" sha1="cdewrnvmauy12uo7o0699dtgaq7w2ab" xml:space="preserve">[https://whonix.org/wiki/index.php/{{FULLPAGENAMEE}} .ssl] | [http://whonix.org.nyud.net/wiki/index.php/{{FULLPAGENAMEE}} .cdn] | [http://zo7fksnun4b4v4jv.onion/wiki/index.php/{{FULLPAGENAMEE}} .onion] | [http://zo7fksnun4b4v4jv.onion.tor2web.org/wiki/index.php/{{FULLPAGENAMEE}} .tor2web] | [http://zo7fksnun4b4v4jv.onion.to/wiki/index.php/{{FULLPAGENAMEE}} .to]
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p
--&gt;

'''Still migrating from sourceforge... You can help so this header can go away! In meanwhile, go the the old homepage: https://sourceforge.net/p/whonix/wiki/Home/'''

&lt;!--
Website questions, shell account requests, and wiki permissions requests to fortasse@riseup.net &lt;ref&gt;https://whonix.org/fortasse.asc&lt;/ref&gt;

Whonix-specific questions to adrelanos at riseup dot net &lt;ref&gt;https://whonix.org/adrelanos.asc&lt;/ref&gt;

User account creation has been disabled for now due to automatic spam bots. Please mail fortasse or adrelanos for new user accounts.

'''Old docs:'''

In mediawiki format:
https://github.com/adrelanos/Whonix-documentation/tree/master/mediawiki

and old markdown format:
https://github.com/adrelanos/Whonix-documentation

{{reflist|close=1}}
--&gt;</text>
      <sha1>cdewrnvmauy12uo7o0699dtgaq7w2ab</sha1>
    </revision>
    <revision>
      <id>908</id>
      <parentid>677</parentid>
      <timestamp>2013-07-11T02:36:42Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>908</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1217" sha1="2lg4pjsbe4skjk52wqsj5s69lt938db" xml:space="preserve">[https://whonix.org/wiki/index.php/{{FULLPAGENAMEE}} .ssl] | [http://zo7fksnun4b4v4jv.onion/wiki/index.php/{{FULLPAGENAMEE}} .onion] | [http://whonix.org.nyud.net/wiki/index.php/{{FULLPAGENAMEE}} .cdn] | [http://zo7fksnun4b4v4jv.onion.tor2web.org/wiki/index.php/{{FULLPAGENAMEE}} .tor2web] | [http://zo7fksnun4b4v4jv.onion.to/wiki/index.php/{{FULLPAGENAMEE}} .to]
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p
--&gt;

'''Still migrating from sourceforge... You can help so this header can go away! In meanwhile, go the the old homepage: https://sourceforge.net/p/whonix/wiki/Home/'''

&lt;!--
Website questions, shell account requests, and wiki permissions requests to fortasse@riseup.net &lt;ref&gt;https://whonix.org/fortasse.asc&lt;/ref&gt;

Whonix-specific questions to adrelanos at riseup dot net &lt;ref&gt;https://whonix.org/adrelanos.asc&lt;/ref&gt;

User account creation has been disabled for now due to automatic spam bots. Please mail fortasse or adrelanos for new user accounts.

'''Old docs:'''

In mediawiki format:
https://github.com/adrelanos/Whonix-documentation/tree/master/mediawiki

and old markdown format:
https://github.com/adrelanos/Whonix-documentation

{{reflist|close=1}}
--&gt;</text>
      <sha1>2lg4pjsbe4skjk52wqsj5s69lt938db</sha1>
    </revision>
    <revision>
      <id>911</id>
      <parentid>908</parentid>
      <timestamp>2013-07-11T02:46:03Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>911</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1267" sha1="lkhyqum9axx0p6ypzvkcyvv19gsktza" xml:space="preserve">&lt;font size="3"&gt;[https://whonix.org/wiki/index.php/{{FULLPAGENAMEE}} .ssl] | [http://zo7fksnun4b4v4jv.onion/wiki/index.php/{{FULLPAGENAMEE}} .onion]&lt;/font&gt; &lt;font size="-3"&gt;| [http://whonix.org.nyud.net/wiki/index.php/{{FULLPAGENAMEE}} .cdn] | [http://zo7fksnun4b4v4jv.onion.tor2web.org/wiki/index.php/{{FULLPAGENAMEE}} .tor2web] | [http://zo7fksnun4b4v4jv.onion.to/wiki/index.php/{{FULLPAGENAMEE}} .to]&lt;/font size&gt;
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p
--&gt;

'''Still migrating from sourceforge... You can help so this header can go away! In meanwhile, go the the old homepage: https://sourceforge.net/p/whonix/wiki/Home/'''

&lt;!--
Website questions, shell account requests, and wiki permissions requests to fortasse@riseup.net &lt;ref&gt;https://whonix.org/fortasse.asc&lt;/ref&gt;

Whonix-specific questions to adrelanos at riseup dot net &lt;ref&gt;https://whonix.org/adrelanos.asc&lt;/ref&gt;

User account creation has been disabled for now due to automatic spam bots. Please mail fortasse or adrelanos for new user accounts.

'''Old docs:'''

In mediawiki format:
https://github.com/adrelanos/Whonix-documentation/tree/master/mediawiki

and old markdown format:
https://github.com/adrelanos/Whonix-documentation

{{reflist|close=1}}
--&gt;</text>
      <sha1>lkhyqum9axx0p6ypzvkcyvv19gsktza</sha1>
    </revision>
    <revision>
      <id>1118</id>
      <parentid>911</parentid>
      <timestamp>2013-07-12T15:20:49Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>1118</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="505" sha1="k7cnb9acrsvimjxvlunszkhp4vcked5" xml:space="preserve">&lt;font size="3"&gt;[https://whonix.org/wiki/index.php/{{FULLPAGENAMEE}} .ssl] | [http://zo7fksnun4b4v4jv.onion/wiki/index.php/{{FULLPAGENAMEE}} .onion]&lt;/font&gt; &lt;font size="-3"&gt;| [http://whonix.org.nyud.net/wiki/index.php/{{FULLPAGENAMEE}} .cdn] | [http://zo7fksnun4b4v4jv.onion.tor2web.org/wiki/index.php/{{FULLPAGENAMEE}} .tor2web] | [http://zo7fksnun4b4v4jv.onion.to/wiki/index.php/{{FULLPAGENAMEE}} .to]&lt;/font size&gt;&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;</text>
      <sha1>k7cnb9acrsvimjxvlunszkhp4vcked5</sha1>
    </revision>
    <revision>
      <id>1294</id>
      <parentid>1118</parentid>
      <timestamp>2013-07-14T20:28:23Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>removed index.php/</comment>
      <origin>1294</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="455" sha1="pyahl9cbfnp2pq1dry9oxmlqisf47sv" xml:space="preserve">&lt;font size="3"&gt;[https://whonix.org/wiki/{{FULLPAGENAMEE}} .ssl] | [http://zo7fksnun4b4v4jv.onion/wiki/{{FULLPAGENAMEE}} .onion]&lt;/font&gt; &lt;font size="-3"&gt;| [http://whonix.org.nyud.net/wiki/{{FULLPAGENAMEE}} .cdn] | [http://zo7fksnun4b4v4jv.onion.tor2web.org/wiki/{{FULLPAGENAMEE}} .tor2web] | [http://zo7fksnun4b4v4jv.onion.to/wiki/{{FULLPAGENAMEE}} .to]&lt;/font size&gt;&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;</text>
      <sha1>pyahl9cbfnp2pq1dry9oxmlqisf47sv</sha1>
    </revision>
    <revision>
      <id>1469</id>
      <parentid>1294</parentid>
      <timestamp>2013-07-17T19:00:28Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>1469</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="534" sha1="nqx3bjxsej715scaww8a50fwkvw4rdg" xml:space="preserve">&lt;font size="3"&gt;[https://whonix.org/wiki/{{FULLPAGENAMEE}} .ssl] | [http://zo7fksnun4b4v4jv.onion/wiki/{{FULLPAGENAMEE}} .onion]&lt;/font&gt; &lt;font size="-3"&gt;| [http://whonix.org.nyud.net/wiki/{{FULLPAGENAMEE}} .cdn] | [http://zo7fksnun4b4v4jv.onion.tor2web.org/wiki/{{FULLPAGENAMEE}} .tor2web] | [http://zo7fksnun4b4v4jv.onion.to/wiki/{{FULLPAGENAMEE}} .to]&lt;/font size&gt;[[Image:donate.png|frame|link=Contribute#Donate|[[Contribute#Donate|Donate!]]]]&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;</text>
      <sha1>nqx3bjxsej715scaww8a50fwkvw4rdg</sha1>
    </revision>
    <revision>
      <id>1472</id>
      <parentid>1469</parentid>
      <timestamp>2013-07-17T19:14:40Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>1472</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="544" sha1="3ob8m9kodovcig4r9yefba68f1q8pvp" xml:space="preserve">&lt;font size="3"&gt;[https://whonix.org/wiki/{{FULLPAGENAMEE}} .ssl] | [http://zo7fksnun4b4v4jv.onion/wiki/{{FULLPAGENAMEE}} .onion]&lt;/font&gt; &lt;font size="-3"&gt;| [http://whonix.org.nyud.net/wiki/{{FULLPAGENAMEE}} .cdn] | [http://zo7fksnun4b4v4jv.onion.tor2web.org/wiki/{{FULLPAGENAMEE}} .tor2web] | [http://zo7fksnun4b4v4jv.onion.to/wiki/{{FULLPAGENAMEE}} .to]&lt;/font size&gt;[[Image:donate.png|frame|link=Contribute#Donate|[[Contribute#Donate|Donate to Whonix!]]]]&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;</text>
      <sha1>3ob8m9kodovcig4r9yefba68f1q8pvp</sha1>
    </revision>
    <revision>
      <id>1473</id>
      <parentid>1472</parentid>
      <timestamp>2013-07-17T19:18:28Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>1473</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="497" sha1="aion30w4c689dizz4eecw3c9ki91ik4" xml:space="preserve">&lt;font size="3"&gt;[https://whonix.org/wiki/{{FULLPAGENAMEE}} .ssl] | [http://zo7fksnun4b4v4jv.onion/wiki/{{FULLPAGENAMEE}} .onion]&lt;/font&gt; &lt;font size="-3"&gt;| [http://whonix.org.nyud.net/wiki/{{FULLPAGENAMEE}} .cdn] | [http://zo7fksnun4b4v4jv.onion.tor2web.org/wiki/{{FULLPAGENAMEE}} .tor2web] | [http://zo7fksnun4b4v4jv.onion.to/wiki/{{FULLPAGENAMEE}} .to] | [[Contribute#Donate|Donate to Whonix!]]&lt;/font size&gt;&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;</text>
      <sha1>aion30w4c689dizz4eecw3c9ki91ik4</sha1>
    </revision>
    <revision>
      <id>1475</id>
      <parentid>1473</parentid>
      <timestamp>2013-07-17T19:21:42Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>1475</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="486" sha1="b3fhzobv0nvczfsvhp8xr1m03704116" xml:space="preserve">&lt;font size="3"&gt;[https://whonix.org/wiki/{{FULLPAGENAMEE}} .ssl] | [http://zo7fksnun4b4v4jv.onion/wiki/{{FULLPAGENAMEE}} .onion]&lt;/font&gt; &lt;font size="-3"&gt;| [http://whonix.org.nyud.net/wiki/{{FULLPAGENAMEE}} .cdn] | [http://zo7fksnun4b4v4jv.onion.tor2web.org/wiki/{{FULLPAGENAMEE}} .tor2web] | [http://zo7fksnun4b4v4jv.onion.to/wiki/{{FULLPAGENAMEE}} .to] | [[Donate|Donate to Whonix!]]&lt;/font size&gt;&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;</text>
      <sha1>b3fhzobv0nvczfsvhp8xr1m03704116</sha1>
    </revision>
    <revision>
      <id>2011</id>
      <parentid>1475</parentid>
      <timestamp>2013-08-01T23:01:17Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>2011</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="709" sha1="gh2fbd2qgn8810qkx76m77h7x9pf8oi" xml:space="preserve">&lt;html&gt;
&lt;a href="https://github.com/Whonix/Whonix"&gt;&lt;img style="position: absolute; top: 0; right: 0; border: 0;" src="https://s3.amazonaws.com/github/ribbons/forkme_right_red_aa0000.png" alt="Fork me on GitHub"&gt;&lt;/a&gt;
&lt;/html&gt;
&lt;font size="3"&gt;[https://whonix.org/wiki/{{FULLPAGENAMEE}} .ssl] | [http://zo7fksnun4b4v4jv.onion/wiki/{{FULLPAGENAMEE}} .onion]&lt;/font&gt; &lt;font size="-3"&gt;| [http://whonix.org.nyud.net/wiki/{{FULLPAGENAMEE}} .cdn] | [http://zo7fksnun4b4v4jv.onion.tor2web.org/wiki/{{FULLPAGENAMEE}} .tor2web] | [http://zo7fksnun4b4v4jv.onion.to/wiki/{{FULLPAGENAMEE}} .to] | [[Donate|Donate to Whonix!]]&lt;/font size&gt;&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;</text>
      <sha1>gh2fbd2qgn8810qkx76m77h7x9pf8oi</sha1>
    </revision>
    <revision>
      <id>2059</id>
      <parentid>2011</parentid>
      <timestamp>2013-08-07T11:35:42Z</timestamp>
      <contributor>
        <username>Anon</username>
        <id>10</id>
      </contributor>
      <origin>2059</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="480" sha1="4nrozaf33502fsu99d65fw64h0t9j4p" xml:space="preserve">&lt;font size="3"&gt;[https://whonix.org/wiki/{{FULLPAGENAMEE}} .ssl] | [http://zo7fksnun4b4v4jv.onion/wiki/{{FULLPAGENAMEE}} .onion]&lt;/font&gt; &lt;font size="-3"&gt;| [http://whonix.org.nyud.net/wiki/{{FULLPAGENAMEE}} .cdn] | [http://zo7fksnun4b4v4jv.tor2web.org/wiki/{{FULLPAGENAMEE}} .tor2web] | [http://zo7fksnun4b4v4jv.onion.to/wiki/{{FULLPAGENAMEE}} .to] | [[Donate|Donate to Whonix!]]&lt;/font size&gt;&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;</text>
      <sha1>4nrozaf33502fsu99d65fw64h0t9j4p</sha1>
    </revision>
    <revision>
      <id>2188</id>
      <parentid>2059</parentid>
      <timestamp>2013-08-09T09:31:37Z</timestamp>
      <contributor>
        <username>Anon</username>
        <id>10</id>
      </contributor>
      <origin>2188</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="481" sha1="n175kwh85ar9mqvh13sjnekchh962pt" xml:space="preserve">&lt;font size="3"&gt;[https://whonix.org/wiki/{{FULLPAGENAMEE}} .ssl] | [http://zo7fksnun4b4v4jv.onion/wiki/{{FULLPAGENAMEE}} .onion]&lt;/font&gt; &lt;font size="-3"&gt;| [http://whonix.org.nyud.net/wiki/{{FULLPAGENAMEE}} .cdn] | [https://zo7fksnun4b4v4jv.tor2web.org/wiki/{{FULLPAGENAMEE}} .tor2web] | [http://zo7fksnun4b4v4jv.onion.to/wiki/{{FULLPAGENAMEE}} .to] | [[Donate|Donate to Whonix!]]&lt;/font size&gt;&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;</text>
      <sha1>n175kwh85ar9mqvh13sjnekchh962pt</sha1>
    </revision>
    <revision>
      <id>2189</id>
      <parentid>2188</parentid>
      <timestamp>2013-08-09T09:35:41Z</timestamp>
      <contributor>
        <username>Anon</username>
        <id>10</id>
      </contributor>
      <origin>2189</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="553" sha1="benf8saqxeoek26p39atafwpsgwgnku" xml:space="preserve">&lt;font size="3"&gt;[https://whonix.org/wiki/{{FULLPAGENAMEE}} .ssl] | &lt;html&gt;&lt;a class="link-https" href="http://zo7fksnun4b4v4jv.onion/wiki/&lt;/html&gt;{{FULLPAGENAMEE}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt;&lt;/font&gt; &lt;font size="-3"&gt;| [http://whonix.org.nyud.net/wiki/{{FULLPAGENAMEE}} .cdn] | [https://zo7fksnun4b4v4jv.tor2web.org/wiki/{{FULLPAGENAMEE}} .tor2web] | [http://zo7fksnun4b4v4jv.onion.to/wiki/{{FULLPAGENAMEE}} .to] | [[Donate|Donate to Whonix!]]&lt;/font size&gt;&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;</text>
      <sha1>benf8saqxeoek26p39atafwpsgwgnku</sha1>
    </revision>
    <revision>
      <id>2190</id>
      <parentid>2189</parentid>
      <timestamp>2013-08-09T09:44:16Z</timestamp>
      <contributor>
        <username>Anon</username>
        <id>10</id>
      </contributor>
      <origin>2190</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="577" sha1="pu814cd6f3vypu984bocspk8l4w7dng" xml:space="preserve">&lt;font size="3"&gt;[https://whonix.org/wiki/{{FULLPAGENAMEE}} https] | &lt;html&gt;&lt;a class="link-https" style="color: #3366BB" href="http://zo7fksnun4b4v4jv.onion/wiki/&lt;/html&gt;{{FULLPAGENAMEE}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt;&lt;/font&gt; &lt;font size="-3"&gt;| [http://whonix.org.nyud.net/wiki/{{FULLPAGENAMEE}} .cdn] | [https://zo7fksnun4b4v4jv.tor2web.org/wiki/{{FULLPAGENAMEE}} .tor2web] | [http://zo7fksnun4b4v4jv.onion.to/wiki/{{FULLPAGENAMEE}} .to] | [[Donate|Donate to Whonix!]]&lt;/font size&gt;&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;</text>
      <sha1>pu814cd6f3vypu984bocspk8l4w7dng</sha1>
    </revision>
    <revision>
      <id>2191</id>
      <parentid>2190</parentid>
      <timestamp>2013-08-09T09:51:29Z</timestamp>
      <contributor>
        <username>Anon</username>
        <id>10</id>
      </contributor>
      <origin>2191</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="607" sha1="p55u2tudujyf7pgyqpl1oveh6miyj7k" xml:space="preserve">&lt;font size="3"&gt;[https://whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" style="color: #3366BB" href="http://zo7fksnun4b4v4jv.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt;&lt;/font&gt; &lt;font size="-3"&gt;| [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} .cdn] | [https://zo7fksnun4b4v4jv.tor2web.org{{localurl:{{FULLPAGENAME}}}} .tor2web] | [http://zo7fksnun4b4v4jv.onion.to{{localurl:{{FULLPAGENAME}}}} .to] | [[Donate|Donate to Whonix!]]&lt;/font size&gt;&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;</text>
      <sha1>p55u2tudujyf7pgyqpl1oveh6miyj7k</sha1>
    </revision>
    <revision>
      <id>2192</id>
      <parentid>2191</parentid>
      <timestamp>2013-08-09T10:01:19Z</timestamp>
      <contributor>
        <username>Anon</username>
        <id>10</id>
      </contributor>
      <origin>2192</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="457" sha1="tugeuiomjkst30feq3zx564vx92cnxb" xml:space="preserve">&lt;font size="3"&gt;[https://whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" style="color: #3366BB" href="http://zo7fksnun4b4v4jv.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt;&lt;/font&gt; &lt;font size="-3"&gt;| [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} cdn] | [[Donate|Donate to Whonix!]]&lt;/font size&gt;&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;</text>
      <sha1>tugeuiomjkst30feq3zx564vx92cnxb</sha1>
    </revision>
    <revision>
      <id>2277</id>
      <parentid>2192</parentid>
      <timestamp>2013-08-10T19:25:07Z</timestamp>
      <contributor>
        <username>Anon</username>
        <id>10</id>
      </contributor>
      <origin>2277</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="460" sha1="owg0dltsy9ub2bzo0nwma0pags7wlrs" xml:space="preserve">&lt;font size="3"&gt;[https://whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" style="color: #3366BB" href="http://zo7fksnun4b4v4jv.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt;&lt;/font&gt; &lt;font size="-3"&gt;| [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} mirror] | [[Donate|Donate to Whonix!]]&lt;/font size&gt;&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;</text>
      <sha1>owg0dltsy9ub2bzo0nwma0pags7wlrs</sha1>
    </revision>
    <revision>
      <id>2278</id>
      <parentid>2277</parentid>
      <timestamp>2013-08-10T19:45:55Z</timestamp>
      <contributor>
        <username>Anon</username>
        <id>10</id>
      </contributor>
      <origin>2278</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="466" sha1="tdvtl4c8olzs1iql6ln6r9w0oted24u" xml:space="preserve">&lt;font size="3"&gt;[https://whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" style="color: #3366BB" href="http://zo7fksnun4b4v4jv.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt;&lt;/font&gt; &lt;font size="-3"&gt;| [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | [[Contribute#Donate|Donate to Whonix!]]&lt;/font&gt;&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;</text>
      <sha1>tdvtl4c8olzs1iql6ln6r9w0oted24u</sha1>
    </revision>
    <revision>
      <id>2480</id>
      <parentid>2278</parentid>
      <timestamp>2013-08-31T23:34:24Z</timestamp>
      <contributor>
        <username>Anon</username>
        <id>10</id>
      </contributor>
      <origin>2480</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="470" sha1="l05i8kdop53yx2p7lh2cxwggdin1g7o" xml:space="preserve">&lt;font size="3"&gt;[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" style="color: #3366BB" href="http://zo7fksnun4b4v4jv.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt;&lt;/font&gt; &lt;font size="-3"&gt;| [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | [[Contribute#Donate|Donate to Whonix!]]&lt;/font&gt;&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;</text>
      <sha1>l05i8kdop53yx2p7lh2cxwggdin1g7o</sha1>
    </revision>
    <revision>
      <id>2524</id>
      <parentid>2480</parentid>
      <timestamp>2013-09-02T16:17:54Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>2524</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="593" sha1="54fx6qt4kw85brk6nko43wl2e5l90et" xml:space="preserve">&lt;font size="4"&gt;[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" style="color: #3366BB" href="http://zo7fksnun4b4v4jv.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt;&lt;/font&gt; &lt;font size="-1"&gt;| [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror]&lt;/font&gt; &lt;font size="-3"&gt;|[https://zo7fksnun4b4v4jv.tor2web.org{{localurl:{{FULLPAGENAME}}}} Mirror2]&lt;/font&gt; | &lt;font size="-3"&gt;[[Contribute#Donate|Donate to Whonix!]]&lt;/font&gt;&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;</text>
      <sha1>54fx6qt4kw85brk6nko43wl2e5l90et</sha1>
    </revision>
    <revision>
      <id>2525</id>
      <parentid>2524</parentid>
      <timestamp>2013-09-02T16:20:55Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>2525</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="593" sha1="rcwuezycfmsx284v42afthmowsen25o" xml:space="preserve">&lt;font size="4"&gt;[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" style="color: #3366BB" href="http://zo7fksnun4b4v4jv.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt;&lt;/font&gt; &lt;font size="-1"&gt;| [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | &lt;/font&gt;&lt;font size="-3"&gt;[https://zo7fksnun4b4v4jv.tor2web.org{{localurl:{{FULLPAGENAME}}}} Mirror2]&lt;/font&gt; |&lt;font size="-3"&gt;[[Contribute#Donate|Donate to Whonix!]]&lt;/font&gt;&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;</text>
      <sha1>rcwuezycfmsx284v42afthmowsen25o</sha1>
    </revision>
    <revision>
      <id>2526</id>
      <parentid>2525</parentid>
      <timestamp>2013-09-02T17:15:21Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <origin>2526</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="546" sha1="qr531t4zbhd1s87f7wgkqq886gzjo48" xml:space="preserve">&lt;font size="3"&gt;[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" style="color: #3366BB" href="http://zo7fksnun4b4v4jv.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt;&lt;/font&gt; &lt;font size="1"&gt;| [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | [https://zo7fksnun4b4v4jv.tor2web.org{{localurl:{{FULLPAGENAME}}}} Mirror] | [[Contribute#Donate|Donate to Whonix!]]&lt;/font&gt;&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;</text>
      <sha1>qr531t4zbhd1s87f7wgkqq886gzjo48</sha1>
    </revision>
    <revision>
      <id>4084</id>
      <parentid>2526</parentid>
      <timestamp>2013-11-23T23:28:17Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>4084</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="546" sha1="pg8qs1uri4qjqyik6qo4p3a290g089u" xml:space="preserve">&lt;font size="3"&gt;[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" style="color: #3366BB" href="http://kkkkkkkkkk63ava6.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt;&lt;/font&gt; &lt;font size="1"&gt;| [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | [https://kkkkkkkkkk63ava6.tor2web.org{{localurl:{{FULLPAGENAME}}}} Mirror] | [[Contribute#Donate|Donate to Whonix!]]&lt;/font&gt;&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;</text>
      <sha1>pg8qs1uri4qjqyik6qo4p3a290g089u</sha1>
    </revision>
    <revision>
      <id>4339</id>
      <parentid>4084</parentid>
      <timestamp>2013-12-18T14:03:50Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>4339</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="614" sha1="ceta8oa9osea7g9cr8aswtxajeud7qg" xml:space="preserve">&lt;font size="3"&gt;[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" style="color: #3366BB" href="http://kkkkkkkkkk63ava6.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt;&lt;/font&gt; &lt;font size="1"&gt;| [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | [https://kkkkkkkkkk63ava6.tor2web.org{{localurl:{{FULLPAGENAME}}}} Mirror] | [[Contribute#Donate|Donate to Whonix!]]&lt;/font&gt;&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;

The .onion is currently down, we are aware, and are working on it!</text>
      <sha1>ceta8oa9osea7g9cr8aswtxajeud7qg</sha1>
    </revision>
    <revision>
      <id>4340</id>
      <parentid>4339</parentid>
      <timestamp>2013-12-18T14:09:38Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <comment>i fixed it! :D</comment>
      <origin>4340</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="546" sha1="pg8qs1uri4qjqyik6qo4p3a290g089u" xml:space="preserve">&lt;font size="3"&gt;[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" style="color: #3366BB" href="http://kkkkkkkkkk63ava6.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt;&lt;/font&gt; &lt;font size="1"&gt;| [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | [https://kkkkkkkkkk63ava6.tor2web.org{{localurl:{{FULLPAGENAME}}}} Mirror] | [[Contribute#Donate|Donate to Whonix!]]&lt;/font&gt;&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;</text>
      <sha1>pg8qs1uri4qjqyik6qo4p3a290g089u</sha1>
    </revision>
    <revision>
      <id>4630</id>
      <parentid>4340</parentid>
      <timestamp>2014-01-09T20:17:25Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>4630</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="701" sha1="8w9in22s9svdx7hztr52kprusd5tik1" xml:space="preserve">&lt;font size="3"&gt;[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" style="color: #3366BB" href="http://kkkkkkkkkk63ava6.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt;&lt;/font&gt; &lt;font size="1"&gt;| [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | [https://kkkkkkkkkk63ava6.tor2web.org{{localurl:{{FULLPAGENAME}}}} Mirror] | [[Contribute#Donate|Donate to Whonix!]]&lt;/font&gt;&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;
&lt;font size="2"&gt;We are making some DNS changes, so the site may be a little broken for a few days. 
The .onion address should continue to work 100%.&lt;/font&gt;</text>
      <sha1>8w9in22s9svdx7hztr52kprusd5tik1</sha1>
    </revision>
    <revision>
      <id>4671</id>
      <parentid>4630</parentid>
      <timestamp>2014-01-13T23:24:36Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>4671</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="638" sha1="bog7bkq8xpfv9ot083w6abkf1meqiel" xml:space="preserve">&lt;font size="3"&gt;[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" style="color: #3366BB" href="http://kkkkkkkkkk63ava6.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt;&lt;/font&gt; &lt;font size="1"&gt;| [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | [https://kkkkkkkkkk63ava6.tor2web.org{{localurl:{{FULLPAGENAME}}}} Mirror] | [[Contribute#Donate|Donate to Whonix!]]&lt;/font&gt; | [[Impressum]] | [[Datenschutz|Datenschutzerklärung]] | [[Disclaimer|Haftungsausschluss]]&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;</text>
      <sha1>bog7bkq8xpfv9ot083w6abkf1meqiel</sha1>
    </revision>
    <revision>
      <id>4782</id>
      <parentid>4671</parentid>
      <timestamp>2014-01-16T18:02:29Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>4782</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="773" sha1="fgwo7fqfvcx7u79tpplkoyw5ttamrhz" xml:space="preserve">&lt;font size="3"&gt;[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" style="color: #3366BB" href="http://kkkkkkkkkk63ava6.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt;&lt;/font&gt; &lt;font size="1"&gt;| [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | [https://kkkkkkkkkk63ava6.tor2web.org{{localurl:{{FULLPAGENAME}}}} Mirror] | [[Contribute#Donate|Donate to Whonix!]]&lt;/font&gt; | [[Impressum]] | [[Datenschutz|Datenschutzerklärung]] | [[Disclaimer|Haftungsausschluss]]&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;

We are aware of the issues, they are the result of DNS changes. They should be resolved in a few hours. The .onion continues to work.</text>
      <sha1>fgwo7fqfvcx7u79tpplkoyw5ttamrhz</sha1>
    </revision>
    <revision>
      <id>4783</id>
      <parentid>4782</parentid>
      <timestamp>2014-01-16T19:54:23Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>4783</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="638" sha1="bog7bkq8xpfv9ot083w6abkf1meqiel" xml:space="preserve">&lt;font size="3"&gt;[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" style="color: #3366BB" href="http://kkkkkkkkkk63ava6.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt;&lt;/font&gt; &lt;font size="1"&gt;| [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | [https://kkkkkkkkkk63ava6.tor2web.org{{localurl:{{FULLPAGENAME}}}} Mirror] | [[Contribute#Donate|Donate to Whonix!]]&lt;/font&gt; | [[Impressum]] | [[Datenschutz|Datenschutzerklärung]] | [[Disclaimer|Haftungsausschluss]]&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;</text>
      <sha1>bog7bkq8xpfv9ot083w6abkf1meqiel</sha1>
    </revision>
    <revision>
      <id>5288</id>
      <parentid>4783</parentid>
      <timestamp>2014-02-11T12:57:57Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>5288</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="853" sha1="jyc76agoa772ijjh5zajq0o5oc526bc" xml:space="preserve">&lt;font size="3"&gt;[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" style="color: #3366BB" href="http://kkkkkkkkkk63ava6.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt;&lt;/font&gt; &lt;font size="1"&gt;| [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | [https://kkkkkkkkkk63ava6.tor2web.org{{localurl:{{FULLPAGENAME}}}} Mirror] | [[Contribute#Donate|Donate to Whonix!]]&lt;/font&gt; | [[Impressum]] | [[Datenschutz|Datenschutzerklärung]] | [[Disclaimer|Haftungsausschluss]]&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;
{{#seo:
|og:type=website
|article:publisher=https://www.facebook.com/Whonix
|article:author=https://www.facebook.com/patrick.schleizer
|og:image=https://www.whonix.org/blog/wp-content/uploads/2014/01/Banner2.png
}}</text>
      <sha1>jyc76agoa772ijjh5zajq0o5oc526bc</sha1>
    </revision>
    <revision>
      <id>5289</id>
      <parentid>5288</parentid>
      <timestamp>2014-02-11T12:59:04Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>5289</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="877" sha1="jplcmamvukdtnvlr1opqqm2lp131m3y" xml:space="preserve">&lt;font size="3"&gt;[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" style="color: #3366BB" href="http://kkkkkkkkkk63ava6.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt;&lt;/font&gt; &lt;font size="1"&gt;| [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | [https://kkkkkkkkkk63ava6.tor2web.org{{localurl:{{FULLPAGENAME}}}} Mirror] | [[Contribute#Donate|Donate to Whonix!]]&lt;/font&gt; | [[Impressum]] | [[Datenschutz|Datenschutzerklärung]] | [[Disclaimer|Haftungsausschluss]]&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;
{{#seo:
|metakeywords=anonymity
|og:type=website
|article:publisher=https://www.facebook.com/Whonix
|article:author=https://www.facebook.com/patrick.schleizer
|og:image=https://www.whonix.org/blog/wp-content/uploads/2014/01/Banner2.png
}}</text>
      <sha1>jplcmamvukdtnvlr1opqqm2lp131m3y</sha1>
    </revision>
    <revision>
      <id>5330</id>
      <parentid>5289</parentid>
      <timestamp>2014-02-12T03:00:19Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>5330</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1263" sha1="juq3z41ke3dqouhbczp6sf29d8rmmdt" xml:space="preserve">&lt;font size="3"&gt;[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" style="color: #3366BB" href="http://kkkkkkkkkk63ava6.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt;&lt;/font&gt; &lt;font size="1"&gt;| [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | [https://kkkkkkkkkk63ava6.tor2web.org{{localurl:{{FULLPAGENAME}}}} Mirror] | [[Contribute#Donate|Donate to Whonix!]]&lt;/font&gt; | [[Impressum]] | [[Datenschutz|Datenschutzerklärung]] | [[Disclaimer|Haftungsausschluss]]&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;
{{#seo:
|metakeywords=anonymity
|og:type=website
|article:publisher=https://www.facebook.com/Whonix
|article:author=https://www.facebook.com/patrick.schleizer
|og:image=https://www.whonix.org/blog/wp-content/uploads/2014/01/Banner2.png
}}
&lt;html&gt;
&lt;!--[if !(lt IE 8)]&gt;&lt;!--&gt;
   &lt;script type="text/javascript"&gt;
     (function(){var e=document.createElement("script");e.type="text/javascript";e.async=true;e.src=document.location.protocol+"//d1agz031tafz8n.cloudfront.net/thedaywefightback.js/widget.min.js";var t=document.getElementsByTagName("script")[0];t.parentNode.insertBefore(e,t)})()
   &lt;/script&gt;
&lt;!--&lt;![endif]--&gt;
&lt;/html&gt;</text>
      <sha1>juq3z41ke3dqouhbczp6sf29d8rmmdt</sha1>
    </revision>
    <revision>
      <id>5334</id>
      <parentid>5330</parentid>
      <timestamp>2014-02-12T15:09:22Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>5334</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="877" sha1="jplcmamvukdtnvlr1opqqm2lp131m3y" xml:space="preserve">&lt;font size="3"&gt;[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" style="color: #3366BB" href="http://kkkkkkkkkk63ava6.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt;&lt;/font&gt; &lt;font size="1"&gt;| [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | [https://kkkkkkkkkk63ava6.tor2web.org{{localurl:{{FULLPAGENAME}}}} Mirror] | [[Contribute#Donate|Donate to Whonix!]]&lt;/font&gt; | [[Impressum]] | [[Datenschutz|Datenschutzerklärung]] | [[Disclaimer|Haftungsausschluss]]&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;
{{#seo:
|metakeywords=anonymity
|og:type=website
|article:publisher=https://www.facebook.com/Whonix
|article:author=https://www.facebook.com/patrick.schleizer
|og:image=https://www.whonix.org/blog/wp-content/uploads/2014/01/Banner2.png
}}</text>
      <sha1>jplcmamvukdtnvlr1opqqm2lp131m3y</sha1>
    </revision>
    <revision>
      <id>6151</id>
      <parentid>5334</parentid>
      <timestamp>2014-03-01T22:18:56Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>6151</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="928" sha1="682mvtdtimfpd6n7hbzhpopp6rdh1rb" xml:space="preserve">&lt;font size="3"&gt;[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" style="color: #3366BB" href="http://kkkkkkkkkk63ava6.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt;&lt;/font&gt; &lt;font size="1"&gt; &lt;sup&gt;[[Forcing .onion on Whonix.org | note]]&lt;/sup&gt;| [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | [https://kkkkkkkkkk63ava6.tor2web.org{{localurl:{{FULLPAGENAME}}}} Mirror] | [[Contribute#Donate|Donate to Whonix!]]&lt;/font&gt; | [[Impressum]] | [[Datenschutz|Datenschutzerklärung]] | [[Disclaimer|Haftungsausschluss]]&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;
{{#seo:
|metakeywords=anonymity
|og:type=website
|article:publisher=https://www.facebook.com/Whonix
|article:author=https://www.facebook.com/patrick.schleizer
|og:image=https://www.whonix.org/blog/wp-content/uploads/2014/01/Banner2.png
}}</text>
      <sha1>682mvtdtimfpd6n7hbzhpopp6rdh1rb</sha1>
    </revision>
    <revision>
      <id>6685</id>
      <parentid>6151</parentid>
      <timestamp>2014-03-07T23:39:50Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>6685</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="927" sha1="b4zjnm9rynl92f0209iz3tuayhr4nki" xml:space="preserve">&lt;font size="3"&gt;[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" style="color: #3366BB" href="http://kkkkkkkkkk63ava6.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt;&lt;/font&gt; &lt;font size="1"&gt; &lt;sup&gt;[[Forcing .onion on Whonix.org|note]]&lt;/sup&gt; | [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | [https://kkkkkkkkkk63ava6.tor2web.org{{localurl:{{FULLPAGENAME}}}} Mirror] | [[Contribute#Donate|Donate to Whonix!]]&lt;/font&gt; | [[Impressum]] | [[Datenschutz|Datenschutzerklärung]] | [[Disclaimer|Haftungsausschluss]]&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;
{{#seo:
|metakeywords=anonymity
|og:type=website
|article:publisher=https://www.facebook.com/Whonix
|article:author=https://www.facebook.com/patrick.schleizer
|og:image=https://www.whonix.org/blog/wp-content/uploads/2014/01/Banner2.png
}}</text>
      <sha1>b4zjnm9rynl92f0209iz3tuayhr4nki</sha1>
    </revision>
    <revision>
      <id>6852</id>
      <parentid>6685</parentid>
      <timestamp>2014-03-11T23:04:06Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>6852</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="238" sha1="625gdewfc221mzclrg4kyszsjd9b8kq" xml:space="preserve">{{#seo:
|metakeywords=anonymity
|og:type=website
|article:publisher=https://www.facebook.com/Whonix
|article:author=https://www.facebook.com/patrick.schleizer
|og:image=https://www.whonix.org/blog/wp-content/uploads/2014/01/Banner2.png
}}</text>
      <sha1>625gdewfc221mzclrg4kyszsjd9b8kq</sha1>
    </revision>
    <revision>
      <id>7089</id>
      <parentid>6852</parentid>
      <timestamp>2014-03-27T23:51:45Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>7089</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="161" sha1="3uci61sog05s6qn0lddfrehnyeq4vis" xml:space="preserve">{{#seo:
|metakeywords=anonymity
|og:type=website
|article:publisher=https://www.facebook.com/Whonix
|article:author=https://www.facebook.com/patrick.schleizer
}}</text>
      <sha1>3uci61sog05s6qn0lddfrehnyeq4vis</sha1>
    </revision>
    <revision>
      <id>7123</id>
      <parentid>7089</parentid>
      <timestamp>2014-03-28T04:23:01Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>7123</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="137" sha1="mxizdvcneoqhj8cm6we9wbc8jmlbcm9" xml:space="preserve">{{#seo:
|og:type=article
|article:publisher=https://www.facebook.com/Whonix
|article:author=https://www.facebook.com/patrick.schleizer
}}</text>
      <sha1>mxizdvcneoqhj8cm6we9wbc8jmlbcm9</sha1>
    </revision>
    <revision>
      <id>7129</id>
      <parentid>7123</parentid>
      <timestamp>2014-03-28T04:41:25Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>7129</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="58" sha1="jo5lialy1lilysc368w1nnbbhd6oc30" xml:space="preserve">{{#seo:
|og:site_name=Whonix
|fb:admins=100007482551659
}}</text>
      <sha1>jo5lialy1lilysc368w1nnbbhd6oc30</sha1>
    </revision>
    <revision>
      <id>7132</id>
      <parentid>7129</parentid>
      <timestamp>2014-03-28T04:49:15Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>7132</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="37" sha1="07e7ni1c5qcuaybwbm4qsl72ty5wnp5" xml:space="preserve">{{#seo:
|fb:admins=100007482551659
}}</text>
      <sha1>07e7ni1c5qcuaybwbm4qsl72ty5wnp5</sha1>
    </revision>
    <revision>
      <id>7133</id>
      <parentid>7132</parentid>
      <timestamp>2014-03-28T04:52:55Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>7133</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="227" sha1="d03ffuznxr6ut3mkzgb9who5ee86osd" xml:space="preserve">{{#seo:
|fb:admins=100007482551659
|twitter:card=summary_large_image
|twitter:site=@Whonix
|twitter:domain=Whonix
|twitter:creator=@Whonix
|twitter:image:src=https://www.whonix.org/w/skins/common/images/135px_Whonix_lock.png
}}</text>
      <sha1>d03ffuznxr6ut3mkzgb9who5ee86osd</sha1>
    </revision>
    <revision>
      <id>7138</id>
      <parentid>7133</parentid>
      <timestamp>2014-03-28T05:35:38Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>7138</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="337" sha1="j7k3mywtnsuhfy5xsupu1btiu3kqmry" xml:space="preserve">{{#seo:
|article:publisher=https://www.facebook.com/Whonix
|article:author=https://www.facebook.com/patrick.schleizer
|fb:admins=100007482551659
|twitter:card=summary_large_image
|twitter:site=@Whonix
|twitter:domain=Whonix
|twitter:creator=@Whonix
|twitter:image:src=https://www.whonix.org/w/skins/common/images/135px_Whonix_lock.png
}}</text>
      <sha1>j7k3mywtnsuhfy5xsupu1btiu3kqmry</sha1>
    </revision>
    <revision>
      <id>7140</id>
      <parentid>7138</parentid>
      <timestamp>2014-03-28T05:42:58Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>7140</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="364" sha1="kpda1ctfftv28ifrw6xaw1t48oi6p7z" xml:space="preserve">{{#seo:
|article:publisher=https://www.facebook.com/Whonix
|article:author=https://www.facebook.com/patrick.schleizer
|fb:admins=100007482551659
|fb:app_id=606207202785157
|twitter:card=summary_large_image
|twitter:site=@Whonix
|twitter:domain=Whonix
|twitter:creator=@Whonix
|twitter:image:src=https://www.whonix.org/w/skins/common/images/135px_Whonix_lock.png
}}</text>
      <sha1>kpda1ctfftv28ifrw6xaw1t48oi6p7z</sha1>
    </revision>
    <revision>
      <id>7658</id>
      <parentid>7140</parentid>
      <timestamp>2014-05-02T16:27:33Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>7658</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3638" sha1="14x1vzy3k47io5ta68d22tkvpx53mac" xml:space="preserve">{{#seo:
|article:publisher=https://www.facebook.com/Whonix
|article:author=https://www.facebook.com/patrick.schleizer
|fb:admins=100007482551659
|fb:app_id=606207202785157
|twitter:card=summary_large_image
|twitter:site=@Whonix
|twitter:domain=Whonix
|twitter:creator=@Whonix
|twitter:image:src=https://www.whonix.org/w/skins/common/images/135px_Whonix_lock.png
}}
[u]Random News:[/u] &lt;random&gt;Bored? Want to chat with other Whonix users? Join us in [url=http://irc://irc.oftc.net/whonix]IRC[/url] chat ([url=https://webirc.oftc.net:8443/?channels=Whonix]Webchat[/url]).
@@@
Don't mind having your name connected to Whonix? Follow us. [url=https://twitter.com/Whonix]Twitter[/url] / [url=https://www.facebook.com/Whonix]Facebook[/url] / [url=https://plus.google.com/108150429836421683225]g+[/url]
@@@
Check out [url=https://www.whonix.org]Whonix blog[/url].
@@@
Did you know that anyone can edit [url=https://www.whonix.org]Whonix's wiki[/url]?
@@@
Want to make Whonix more safe and usable? We're looking for helping hands. Check out [url=https://github.com/Whonix/Whonix/issues]Github Issues[/url] and [url=https://www.whonix.org/forum/index.php/board,5.0.html]development forum[/url].
@@@
Please consider a [url=https://www.whonix.org/wiki/Donate]recurring donation[/url]!
@@@
Want to get involved with Whonix? Check out our [url=https://www.whonix.org/wiki/Contribute]Contribute[/url] page.
@@@
Did you know you can [url=https://www.whonix.org/wiki/Forcing_.onion_on_Whonix.org]enforce using an alternative .onion domain[/url] to access this website?
@@@
Did you know, that Whonix has some protection against [url=https://en.wikipedia.org/wiki/Backdoor_(computing)]backdoors[/url]? The [url=https://www.whonix.org/wiki/Verifiable_Builds]Verifiable Builds[/url] feature only adds security if people like you actually use it!
@@@
Do you know our [url=https://www.whonix.org/wiki/Documentation]Documentation[/url], [url=https://www.whonix.org/wiki/Design]Technical Design[/url] and [url=https://www.whonix.org/wiki/Dev/Developer_Portal]Developer Portal[/url] already?
@@@
There are [url=https://www.whonix.org/wiki/Dev/git#subscribe_to_code_changes]5 different options[/url] to subscribe to Whonix source code changes.
@@@
Join us testing new [url=https://www.whonix.org/wiki/AppArmor]AppArmor profiles[/url] for improved security! ([url=https://www.whonix.org/forum/index.php/topic,97.0.html]forum discussion[/url])
@@@
Brainstorming: [url=https://www.whonix.org/forum/index.php/topic,215.0.html]Where Whonix wants to be in 2 or 5 years?[/url]
@@@
Interested in becoming author for [url=https://www.whonix.org/blog]Whonix blog[/url]? Writing about anonymity/privacy/security? Get in touch!
@@@
Wondering why Whonix will always be Free? Check out [url=https://www.whonix.org/wiki/Why_Whonix_is_Free_Software]Why Whonix is Free Software[/url].
@@@
It would be great if you could create a Wikipedia page for Whonix ([url=https://en.wikipedia.org/w/index.php?title=Whonix&amp;redirect=no]its own article[/url], not a [url=https://en.wikipedia.org/wiki/Whonix#Whonix_.28Anonymous_Operating_System.29]redirection[/url] to another page).
@@@
Did you [url=https://www.whonix.org/wiki/Contribute]contribiute[/url]  to Whonix? Feel free to add your name and what you did to the [url=https://www.whonix.org/wiki/Authorship]Whonix Authorship[/url] page.
@@@
Please [url=https://www.whonix.org/wiki/Contribute]contribute[/url] by [url=http://https://www.whonix.org/wiki/Contribute#Answer_Questions]answering questions[/url].
@@@
[url=https://www.whonix.org/blog/translations-coordinator]Whonix Project looking for Translations Coordinator![/url]
&lt;/random&gt;</text>
      <sha1>14x1vzy3k47io5ta68d22tkvpx53mac</sha1>
    </revision>
    <revision>
      <id>7659</id>
      <parentid>7658</parentid>
      <timestamp>2014-05-02T16:29:22Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>7659</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="379" sha1="0puyybw36jahvfo33or6hya9mvjhf7j" xml:space="preserve">{{#seo:
|article:publisher=https://www.facebook.com/Whonix
|article:author=https://www.facebook.com/patrick.schleizer
|fb:admins=100007482551659
|fb:app_id=606207202785157
|twitter:card=summary_large_image
|twitter:site=@Whonix
|twitter:domain=Whonix
|twitter:creator=@Whonix
|twitter:image:src=https://www.whonix.org/w/skins/common/images/135px_Whonix_lock.png
}}
{{RandomNews}}</text>
      <sha1>0puyybw36jahvfo33or6hya9mvjhf7j</sha1>
    </revision>
    <revision>
      <id>15413</id>
      <parentid>7659</parentid>
      <timestamp>2015-03-17T20:34:36Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>15413</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="405" sha1="gaoz6tlhe9r9hr1mhf7s4db9uyn6y1k" xml:space="preserve">{{#seo:
|article:publisher=https://www.facebook.com/Whonix
|article:author=https://www.facebook.com/patrick.schleizer
|fb:admins=100007482551659
|fb:app_id=606207202785157
|twitter:card=summary_large_image
|twitter:site=@Whonix
|twitter:domain=Whonix
|twitter:creator=@Whonix
|twitter:image:src=https://www.whonix.org/w/skins/common/images/135px_Whonix_lock.png
}}
&lt;!--{{#widget:Header}}--&gt;
{{RandomNews}}</text>
      <sha1>gaoz6tlhe9r9hr1mhf7s4db9uyn6y1k</sha1>
    </revision>
    <revision>
      <id>15421</id>
      <parentid>15413</parentid>
      <timestamp>2015-03-17T20:49:51Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>15421</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="398" sha1="oui7xkqweuup01vhx905yvxih8xlrj6" xml:space="preserve">{{#seo:
|article:publisher=https://www.facebook.com/Whonix
|article:author=https://www.facebook.com/patrick.schleizer
|fb:admins=100007482551659
|fb:app_id=606207202785157
|twitter:card=summary_large_image
|twitter:site=@Whonix
|twitter:domain=Whonix
|twitter:creator=@Whonix
|twitter:image:src=https://www.whonix.org/w/skins/common/images/135px_Whonix_lock.png
}}
{{#widget:Header}}
{{RandomNews}}</text>
      <sha1>oui7xkqweuup01vhx905yvxih8xlrj6</sha1>
    </revision>
    <revision>
      <id>15434</id>
      <parentid>15421</parentid>
      <timestamp>2015-03-18T20:00:21Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>15434</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="383" sha1="k2793zkesn9gwaqatkob1yrxdmab65t" xml:space="preserve">{{#seo:
|article:publisher=https://www.facebook.com/Whonix
|article:author=https://www.facebook.com/patrick.schleizer
|fb:admins=100007482551659
|fb:app_id=606207202785157
|twitter:card=summary_large_image
|twitter:site=@Whonix
|twitter:domain=Whonix
|twitter:creator=@Whonix
|twitter:image:src=https://www.whonix.org/w/images/e/e0/210-Banner.png
}}
{{#widget:Header}}
{{RandomNews}}</text>
      <sha1>k2793zkesn9gwaqatkob1yrxdmab65t</sha1>
    </revision>
    <revision>
      <id>15436</id>
      <parentid>15434</parentid>
      <timestamp>2015-03-18T20:06:50Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>15436</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="398" sha1="oui7xkqweuup01vhx905yvxih8xlrj6" xml:space="preserve">{{#seo:
|article:publisher=https://www.facebook.com/Whonix
|article:author=https://www.facebook.com/patrick.schleizer
|fb:admins=100007482551659
|fb:app_id=606207202785157
|twitter:card=summary_large_image
|twitter:site=@Whonix
|twitter:domain=Whonix
|twitter:creator=@Whonix
|twitter:image:src=https://www.whonix.org/w/skins/common/images/135px_Whonix_lock.png
}}
{{#widget:Header}}
{{RandomNews}}</text>
      <sha1>oui7xkqweuup01vhx905yvxih8xlrj6</sha1>
    </revision>
    <revision>
      <id>19426</id>
      <parentid>15436</parentid>
      <timestamp>2015-11-27T18:54:34Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>19426</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="383" sha1="46xlbjll9i211y7vanxv5k5ujtmpecj" xml:space="preserve">{{#seo:
|article:publisher=https://www.facebook.com/Whonix
|article:author=https://www.facebook.com/patrick.schleizer
|fb:admins=100007482551659
|fb:app_id=606207202785157
|twitter:card=summary_large_image
|twitter:site=@Whonix
|twitter:domain=Whonix
|twitter:creator=@Whonix
|twitter:image:src=https://www.whonix.org/w/skins/common/images/135px_Whonix_lock.png
}}
{{#widget:Header}}</text>
      <sha1>46xlbjll9i211y7vanxv5k5ujtmpecj</sha1>
    </revision>
    <revision>
      <id>20113</id>
      <parentid>19426</parentid>
      <timestamp>2015-12-07T11:23:57Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>20113</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="453" sha1="66k7rdgvjtgak2nfodf619p1c2nj4g2" xml:space="preserve">{{#seo:
|article:publisher=https://www.facebook.com/Whonix
|article:author=https://www.facebook.com/patrick.schleizer
|fb:admins=100007482551659
|fb:app_id=606207202785157
|twitter:card=summary_large_image
|twitter:site=@Whonix
|twitter:domain=Whonix
|twitter:creator=@Whonix
|twitter:image:src=https://www.whonix.org/w/skins/common/images/135px_Whonix_lock.png
|og:image=https://www.whonix.org/w/images/7/7f/Whonix_logo470x246.png
}}
{{#widget:Header}}</text>
      <sha1>66k7rdgvjtgak2nfodf619p1c2nj4g2</sha1>
    </revision>
    <revision>
      <id>21270</id>
      <parentid>20113</parentid>
      <timestamp>2016-01-03T15:47:00Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>21270</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="394" sha1="l9jrri5plre42ih8dl9tsxlmbxe1z8s" xml:space="preserve">{{#seo:
|article:publisher=https://www.facebook.com/Whonix
|fb:admins=100007482551659
|fb:app_id=606207202785157
|twitter:card=summary_large_image
|twitter:site=@Whonix
|twitter:domain=Whonix
|twitter:creator=@Whonix
|twitter:image:src=https://www.whonix.org/w/skins/common/images/135px_Whonix_lock.png
|og:image=https://www.whonix.org/w/images/7/7f/Whonix_logo470x246.png
}}
{{#widget:Header}}</text>
      <sha1>l9jrri5plre42ih8dl9tsxlmbxe1z8s</sha1>
    </revision>
    <revision>
      <id>21273</id>
      <parentid>21270</parentid>
      <timestamp>2016-01-03T15:52:43Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>21273</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="442" sha1="ig1qoh2o5tqithmoz6avfas0ms317g6" xml:space="preserve">{{#seo:
|article:publisher=https://www.facebook.com/Whonix
|article:author=https://www.facebook.com/Whonix
|fb:admins=100007482551659
|fb:app_id=606207202785157
|twitter:card=summary_large_image
|twitter:site=@Whonix
|twitter:domain=Whonix
|twitter:creator=@Whonix
|twitter:image:src=https://www.whonix.org/w/skins/common/images/135px_Whonix_lock.png
|og:image=https://www.whonix.org/w/images/7/7f/Whonix_logo470x246.png
}}
{{#widget:Header}}</text>
      <sha1>ig1qoh2o5tqithmoz6avfas0ms317g6</sha1>
    </revision>
    <revision>
      <id>24427</id>
      <parentid>21273</parentid>
      <timestamp>2016-06-27T12:19:30Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>24427</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="435" sha1="4wvgrh1clru0nq01hieham3ucsf310i" xml:space="preserve">{{#seo:
|article:publisher=https://www.facebook.com/Whonix
|article:author=https://www.facebook.com/Whonix
|fb:admins=100007482551659
|fb:app_id=606207202785157
|twitter:card=summary_large_image
|twitter:site=@Whonix
|twitter:domain=Whonix
|twitter:creator=@Whonix
|twitter:image:src=https://www.whonix.org/w/images/c/c9/Whonix_logo600x321.png
|og:image=https://www.whonix.org/w/images/7/7f/Whonix_logo470x246.png
}}
{{#widget:Header}}</text>
      <sha1>4wvgrh1clru0nq01hieham3ucsf310i</sha1>
    </revision>
    <revision>
      <id>24498</id>
      <parentid>24427</parentid>
      <timestamp>2016-06-28T19:33:35Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>24498</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="445" sha1="pe4pmx49xlgevjlboh87g31co0t18lx" xml:space="preserve">{{#seo:
|article:publisher=https://www.facebook.com/Whonix
|article:author=https://www.facebook.com/Whonix
|fb:admins=100007482551659
|fb:app_id=606207202785157
|twitter:card=summary_large_image
|twitter:site=@Whonix
|twitter:domain=Whonix
|twitter:creator=@Whonix
|twitter:image:src=https://www.whonix.org/w/images/c/c9/Whonix_logo600x321.png
|og:image=https://www.whonix.org/w/images/4/47/Whonix_Facebook_Social_Share.png
}}
{{#widget:Header}}</text>
      <sha1>pe4pmx49xlgevjlboh87g31co0t18lx</sha1>
    </revision>
    <revision>
      <id>27163</id>
      <parentid>24498</parentid>
      <timestamp>2017-01-03T17:49:26Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>27163</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="441" sha1="e8gvcl98dnvvt6ct4cqv66stq2ayjam" xml:space="preserve">{{#seo:
|article:publisher=https://www.facebook.com/Whonix
|article:author=https://www.facebook.com/Whonix
|fb:admins=100007482551659
|fb:app_id=606207202785157
|twitter:card=summary_large_image
|twitter:site=@Whonix
|twitter:domain=Whonix
|twitter:creator=@Whonix
|twitter:image=https://www.whonix.org/w/images/c/c9/Whonix_logo600x321.png
|og:image=https://www.whonix.org/w/images/4/47/Whonix_Facebook_Social_Share.png
}}
{{#widget:Header}}</text>
      <sha1>e8gvcl98dnvvt6ct4cqv66stq2ayjam</sha1>
    </revision>
    <revision>
      <id>27165</id>
      <parentid>27163</parentid>
      <timestamp>2017-01-03T18:17:28Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>27165</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="363" sha1="0h6o96o4u5trcd65qnsqjdvtf38mcgf" xml:space="preserve">{{#seo:
|article:publisher=https://www.facebook.com/Whonix
|article:author=https://www.facebook.com/Whonix
|fb:admins=100007482551659
|fb:app_id=606207202785157
|twitter:card=summary_large_image
|twitter:site=@Whonix
|twitter:domain=Whonix
|twitter:creator=@Whonix
|image=https://www.whonix.org/w/images/4/47/Whonix_Facebook_Social_Share.png
}}
{{#widget:Header}}</text>
      <sha1>0h6o96o4u5trcd65qnsqjdvtf38mcgf</sha1>
    </revision>
    <revision>
      <id>31808</id>
      <parentid>27165</parentid>
      <timestamp>2018-01-06T04:29:04Z</timestamp>
      <contributor>
        <username>Mrscreenshot</username>
        <id>4497</id>
      </contributor>
      <minor/>
      <comment>Protected "[[Template:Header]]" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))</comment>
      <origin>31808</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="363" sha1="0h6o96o4u5trcd65qnsqjdvtf38mcgf" xml:space="preserve">{{#seo:
|article:publisher=https://www.facebook.com/Whonix
|article:author=https://www.facebook.com/Whonix
|fb:admins=100007482551659
|fb:app_id=606207202785157
|twitter:card=summary_large_image
|twitter:site=@Whonix
|twitter:domain=Whonix
|twitter:creator=@Whonix
|image=https://www.whonix.org/w/images/4/47/Whonix_Facebook_Social_Share.png
}}
{{#widget:Header}}</text>
      <sha1>0h6o96o4u5trcd65qnsqjdvtf38mcgf</sha1>
    </revision>
    <revision>
      <id>45485</id>
      <parentid>31808</parentid>
      <timestamp>2019-04-25T11:39:49Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "/Whonix" to "/{{project_name_short}}"</comment>
      <origin>45485</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="411" sha1="4fp1mdwt6ravupwqr7wz9d4glrgodba" xml:space="preserve">{{#seo:
|article:publisher=https://www.facebook.com/{{project_name_short}}
|article:author=https://www.facebook.com/{{project_name_short}}
|fb:admins=100007482551659
|fb:app_id=606207202785157
|twitter:card=summary_large_image
|twitter:site=@Whonix
|twitter:domain=Whonix
|twitter:creator=@Whonix
|image=https://www.whonix.org/w/images/4/47/{{project_name_short}}_Facebook_Social_Share.png
}}
{{#widget:Header}}</text>
      <sha1>4fp1mdwt6ravupwqr7wz9d4glrgodba</sha1>
    </revision>
    <revision>
      <id>51786</id>
      <parentid>45485</parentid>
      <timestamp>2019-10-29T14:03:23Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>51786</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="395" sha1="pm2ax4sua04r7t5rr8fi8wrstws211k" xml:space="preserve">{{#seo:
|article:publisher=https://www.facebook.com/{{project_name_short}}
|article:author=https://www.facebook.com/{{project_name_short}}
|fb:admins=100007482551659
|fb:app_id=606207202785157
|twitter:card=summary_large_image
|twitter:site=@Whonix
|twitter:domain=Whonix
|twitter:creator=@Whonix
|image=https://www.whonix.org/w/images/4/47/Whonix_Facebook_Social_Share.png
}}
{{#widget:Header}}</text>
      <sha1>pm2ax4sua04r7t5rr8fi8wrstws211k</sha1>
    </revision>
    <revision>
      <id>51824</id>
      <parentid>51786</parentid>
      <timestamp>2019-10-31T14:42:06Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>51824</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="179" sha1="ntynyl2543ceq98suujyl65mhc4f3jv" xml:space="preserve">{{#seo:
|article:publisher=https://www.facebook.com/{{project_name_short}}
|author=https://www.facebook.com/{{project_name_short}}
|fb:admins=100007482551659
}}
{{#widget:Header}}</text>
      <sha1>ntynyl2543ceq98suujyl65mhc4f3jv</sha1>
    </revision>
    <revision>
      <id>52321</id>
      <parentid>51824</parentid>
      <timestamp>2019-11-08T09:08:47Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>52321</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="250" sha1="jjfy2r0io0q5i64p1nrto33e0ej4o9n" xml:space="preserve">[[File:Donate.png|thumbnail|125px|alt=Donate|link=#Donate|[[Donate]]]]
{{#seo:
|article:publisher=https://www.facebook.com/{{project_name_short}}
|author=https://www.facebook.com/{{project_name_short}}
|fb:admins=100007482551659
}}
{{#widget:Header}}</text>
      <sha1>jjfy2r0io0q5i64p1nrto33e0ej4o9n</sha1>
    </revision>
    <revision>
      <id>52329</id>
      <parentid>52321</parentid>
      <timestamp>2019-11-08T09:23:50Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>52329</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="249" sha1="8rwsvd61qysyfrhxq7bbwl7yby045v0" xml:space="preserve">[[File:Donate.png|thumbnail|125px|alt=Donate|link=Donate|[[Donate]]]]
{{#seo:
|article:publisher=https://www.facebook.com/{{project_name_short}}
|author=https://www.facebook.com/{{project_name_short}}
|fb:admins=100007482551659
}}
{{#widget:Header}}</text>
      <sha1>8rwsvd61qysyfrhxq7bbwl7yby045v0</sha1>
    </revision>
    <revision>
      <id>52384</id>
      <parentid>52329</parentid>
      <timestamp>2019-11-08T15:24:01Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>52384</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="230" sha1="73mxhyehle14zfb3qsb4j406x6orgkj" xml:space="preserve">[[File:Donate.png|thumbnail|125px|alt=Donate|link=Donate|[[Donate]]]]
{{#seo:
|article:publisher=https://www.facebook.com/{{project_name_short}}
|author=https://www.facebook.com/{{project_name_short}}
|fb:admins=100007482551659
}}</text>
      <sha1>73mxhyehle14zfb3qsb4j406x6orgkj</sha1>
    </revision>
    <revision>
      <id>53228</id>
      <parentid>52384</parentid>
      <timestamp>2019-12-04T06:44:08Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>53228</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="160" sha1="1t4jsz685bl3dgkgwzcak6onjuc64ol" xml:space="preserve">{{#seo:
|article:publisher=https://www.facebook.com/{{project_name_short}}
|author=https://www.facebook.com/{{project_name_short}}
|fb:admins=100007482551659
}}</text>
      <sha1>1t4jsz685bl3dgkgwzcak6onjuc64ol</sha1>
    </revision>
    <revision>
      <id>54293</id>
      <parentid>53228</parentid>
      <timestamp>2020-01-22T18:50:06Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>Blanked the page</comment>
      <origin>54293</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="0" sha1="phoiac9h4m842xq45sp7s6u21eteeq1" xml:space="preserve" />
      <sha1>phoiac9h4m842xq45sp7s6u21eteeq1</sha1>
    </revision>
    <revision>
      <id>54294</id>
      <parentid>54293</parentid>
      <timestamp>2020-01-22T18:50:26Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>54294</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="160" sha1="1t4jsz685bl3dgkgwzcak6onjuc64ol" xml:space="preserve">{{#seo:
|article:publisher=https://www.facebook.com/{{project_name_short}}
|author=https://www.facebook.com/{{project_name_short}}
|fb:admins=100007482551659
}}</text>
      <sha1>1t4jsz685bl3dgkgwzcak6onjuc64ol</sha1>
    </revision>
    <revision>
      <id>54295</id>
      <parentid>54294</parentid>
      <timestamp>2020-01-22T18:51:17Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>54295</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="175" sha1="aifuyvafmyejarol53nsraoxol6qdxz" xml:space="preserve">{{#seo:
|article:publisher=https://www.facebook.com/{{project_name_short}}
|author=https://www.facebook.com/{{project_name_short}}
|fb:admins=100007482551659
}}
&lt;!--comment--&gt;</text>
      <sha1>aifuyvafmyejarol53nsraoxol6qdxz</sha1>
    </revision>
    <revision>
      <id>54296</id>
      <parentid>54295</parentid>
      <timestamp>2020-01-22T18:51:52Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>54296</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="179" sha1="396xv21qowzi7x8imopewv8ynzner5k" xml:space="preserve">{{#seo:
|article:publisher=https://www.facebook.com/{{project_name_short}}
|author=https://www.facebook.com/{{project_name_short}}
|fb:admins=100007482551659
}}
&lt;!--testcomment--&gt;</text>
      <sha1>396xv21qowzi7x8imopewv8ynzner5k</sha1>
    </revision>
    <revision>
      <id>54297</id>
      <parentid>54296</parentid>
      <timestamp>2020-01-22T18:52:10Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>54297</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="160" sha1="1t4jsz685bl3dgkgwzcak6onjuc64ol" xml:space="preserve">{{#seo:
|article:publisher=https://www.facebook.com/{{project_name_short}}
|author=https://www.facebook.com/{{project_name_short}}
|fb:admins=100007482551659
}}</text>
      <sha1>1t4jsz685bl3dgkgwzcak6onjuc64ol</sha1>
    </revision>
    <revision>
      <id>54298</id>
      <parentid>54297</parentid>
      <timestamp>2020-01-22T18:53:12Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>54298</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="188" sha1="r1bxbj2aj0xhjeszqyyfz446yv6rvkt" xml:space="preserve">{{#seo:
|article:publisher=https://www.facebook.com/{{project_name_short}}
|author=https://www.facebook.com/{{project_name_short}}
|fb:admins=100007482551659
}}
&lt;noinclude&gt;test&lt;/noinclude&gt;</text>
      <sha1>r1bxbj2aj0xhjeszqyyfz446yv6rvkt</sha1>
    </revision>
    <revision>
      <id>54299</id>
      <parentid>54298</parentid>
      <timestamp>2020-01-22T18:54:24Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>54299</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="167" sha1="1a8nnii8scqxj0iel584dyx14r83qzy" xml:space="preserve">{{#seo:
|article:publisher=https://www.facebook.com/{{project_name_short}}
|author=https://www.facebook.com/{{project_name_short}}
|fb:admins=100007482551659
}}
&amp;zwnj;</text>
      <sha1>1a8nnii8scqxj0iel584dyx14r83qzy</sha1>
    </revision>
    <revision>
      <id>54300</id>
      <parentid>54299</parentid>
      <timestamp>2020-01-22T18:54:36Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>54300</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="166" sha1="pjq547xr99g4onp6znxhvx4922fwq9r" xml:space="preserve">{{#seo:
|article:publisher=https://www.facebook.com/{{project_name_short}}
|author=https://www.facebook.com/{{project_name_short}}
|fb:admins=100007482551659
}}&amp;zwnj;</text>
      <sha1>pjq547xr99g4onp6znxhvx4922fwq9r</sha1>
    </revision>
    <revision>
      <id>54301</id>
      <parentid>54300</parentid>
      <timestamp>2020-01-22T18:55:51Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>54301</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="160" sha1="1t4jsz685bl3dgkgwzcak6onjuc64ol" xml:space="preserve">{{#seo:
|article:publisher=https://www.facebook.com/{{project_name_short}}
|author=https://www.facebook.com/{{project_name_short}}
|fb:admins=100007482551659
}}</text>
      <sha1>1t4jsz685bl3dgkgwzcak6onjuc64ol</sha1>
    </revision>
    <revision>
      <id>54302</id>
      <parentid>54301</parentid>
      <timestamp>2020-01-22T18:57:12Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>54302</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="208" sha1="e26x0tv1a6ryfx7g6kqvssez8392a8n" xml:space="preserve">&lt;includeonly&gt;This is a template. &lt;/includeonly&gt;
{{#seo:
|article:publisher=https://www.facebook.com/{{project_name_short}}
|author=https://www.facebook.com/{{project_name_short}}
|fb:admins=100007482551659
}}</text>
      <sha1>e26x0tv1a6ryfx7g6kqvssez8392a8n</sha1>
    </revision>
    <revision>
      <id>54303</id>
      <parentid>54302</parentid>
      <timestamp>2020-01-22T18:58:51Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>54303</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="226" sha1="nffdl3fbrjkf1i18qxee054mybloele" xml:space="preserve">&lt;includeonly&gt;This is a template. &lt;/includeonly&gt;
&lt;nowiki&gt;&lt;/nowiki&gt;
{{#seo:
|article:publisher=https://www.facebook.com/{{project_name_short}}
|author=https://www.facebook.com/{{project_name_short}}
|fb:admins=100007482551659
}}</text>
      <sha1>nffdl3fbrjkf1i18qxee054mybloele</sha1>
    </revision>
    <revision>
      <id>54304</id>
      <parentid>54303</parentid>
      <timestamp>2020-01-22T18:59:22Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>54304</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="178" sha1="m8ns9mmo46nqcu8d5mawqjyx308pv6p" xml:space="preserve">&lt;nowiki&gt;&lt;/nowiki&gt;
{{#seo:
|article:publisher=https://www.facebook.com/{{project_name_short}}
|author=https://www.facebook.com/{{project_name_short}}
|fb:admins=100007482551659
}}</text>
      <sha1>m8ns9mmo46nqcu8d5mawqjyx308pv6p</sha1>
    </revision>
    <revision>
      <id>54311</id>
      <parentid>54304</parentid>
      <timestamp>2020-01-22T19:07:18Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>Replaced content with "&lt;nowiki&gt;&lt;/nowiki&gt;"</comment>
      <origin>54311</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="17" sha1="5piame0cpweko5j83shgekca1bwnrtu" xml:space="preserve">&lt;nowiki&gt;&lt;/nowiki&gt;</text>
      <sha1>5piame0cpweko5j83shgekca1bwnrtu</sha1>
    </revision>
    <revision>
      <id>56051</id>
      <parentid>54311</parentid>
      <timestamp>2020-04-19T17:32:03Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>56051</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="48" sha1="88hxfolwls3ehzon79fp42e4qd7j1b9" xml:space="preserve">&lt;nowiki&gt;&lt;/nowiki&gt;
{{#seo:
|title_mode=replace
}}</text>
      <sha1>88hxfolwls3ehzon79fp42e4qd7j1b9</sha1>
    </revision>
    <revision>
      <id>56232</id>
      <parentid>56051</parentid>
      <timestamp>2020-04-26T09:41:15Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>56232</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="68" sha1="n8gft7pv1vf6je8rvg66iecl88fa8xx" xml:space="preserve">&lt;nowiki&gt;&lt;/nowiki&gt;
{{#seo:
|title_mode=replace
|title={{PAGENAME}}
}}</text>
      <sha1>n8gft7pv1vf6je8rvg66iecl88fa8xx</sha1>
    </revision>
    <revision>
      <id>56247</id>
      <parentid>56232</parentid>
      <timestamp>2020-04-26T11:21:13Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>56247</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="48" sha1="88hxfolwls3ehzon79fp42e4qd7j1b9" xml:space="preserve">&lt;nowiki&gt;&lt;/nowiki&gt;
{{#seo:
|title_mode=replace
}}</text>
      <sha1>88hxfolwls3ehzon79fp42e4qd7j1b9</sha1>
    </revision>
    <revision>
      <id>77195</id>
      <parentid>56247</parentid>
      <timestamp>2022-01-13T15:29:18Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>77195</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="121" sha1="mw9wf9fkr7whnb4ugyrt03u0kbjowe5" xml:space="preserve">&lt;nowiki&gt;&lt;/nowiki&gt;
{{#seo:
|title_mode=replace
}}
{{#css:Mediawiki:Header2.css}}
{{#widget:Header2|page={{FULLPAGENAME}}}}</text>
      <sha1>mw9wf9fkr7whnb4ugyrt03u0kbjowe5</sha1>
    </revision>
    <revision>
      <id>77230</id>
      <parentid>77195</parentid>
      <timestamp>2022-01-13T16:58:57Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>77230</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="120" sha1="srhzc7w4ak0w4gqhbc8gc3m9pud6578" xml:space="preserve">{{#css:Mediawiki:Header2.css}}
&lt;nowiki&gt;&lt;/nowiki&gt;
{{#seo:
|title_mode=replace
}}{{#widget:Header2|page={{FULLPAGENAME}}}}</text>
      <sha1>srhzc7w4ak0w4gqhbc8gc3m9pud6578</sha1>
    </revision>
    <revision>
      <id>77231</id>
      <parentid>77230</parentid>
      <timestamp>2022-01-13T16:59:36Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>77231</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="121" sha1="qy09nmxq3ewiac4qt9u21787jxhbs0u" xml:space="preserve">{{#css:Mediawiki:Header2.css}}
&lt;nowiki&gt;&lt;/nowiki&gt;
{{#seo:
|title_mode=replace
}}
{{#widget:Header2|page={{FULLPAGENAME}}}}</text>
      <sha1>qy09nmxq3ewiac4qt9u21787jxhbs0u</sha1>
    </revision>
    <revision>
      <id>77543</id>
      <parentid>77231</parentid>
      <timestamp>2022-01-15T15:49:16Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>77543</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="157" sha1="6wxtvgn8j8aognjcce6yvp28adbwvhz" xml:space="preserve">{{#css:Mediawiki:Header2.css}}
{{#css:MediaWiki:SiteSpecific.css}}
&lt;nowiki&gt;&lt;/nowiki&gt;
{{#seo:
|title_mode=replace
}}
{{#widget:Header2|page={{FULLPAGENAME}}}}</text>
      <sha1>6wxtvgn8j8aognjcce6yvp28adbwvhz</sha1>
    </revision>
    <revision>
      <id>77645</id>
      <parentid>77543</parentid>
      <timestamp>2022-01-17T13:51:26Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>77645</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="108" sha1="2e27rb6vk6t3a4h1a7xyo76i3yg9ctu" xml:space="preserve">{{#css:Mediawiki:Header2.css}}
{{#css:MediaWiki:SiteSpecific.css}}
{{#widget:Header2|page={{FULLPAGENAME}}}}</text>
      <sha1>2e27rb6vk6t3a4h1a7xyo76i3yg9ctu</sha1>
    </revision>
    <revision>
      <id>77646</id>
      <parentid>77645</parentid>
      <timestamp>2022-01-17T13:51:46Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>77646</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="157" sha1="6wxtvgn8j8aognjcce6yvp28adbwvhz" xml:space="preserve">{{#css:Mediawiki:Header2.css}}
{{#css:MediaWiki:SiteSpecific.css}}
&lt;nowiki&gt;&lt;/nowiki&gt;
{{#seo:
|title_mode=replace
}}
{{#widget:Header2|page={{FULLPAGENAME}}}}</text>
      <sha1>6wxtvgn8j8aognjcce6yvp28adbwvhz</sha1>
    </revision>
    <revision>
      <id>77647</id>
      <parentid>77646</parentid>
      <timestamp>2022-01-17T13:52:04Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <comment>Blanked the page</comment>
      <origin>77647</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="0" sha1="phoiac9h4m842xq45sp7s6u21eteeq1" xml:space="preserve" />
      <sha1>phoiac9h4m842xq45sp7s6u21eteeq1</sha1>
    </revision>
    <revision>
      <id>77648</id>
      <parentid>77647</parentid>
      <timestamp>2022-01-17T13:52:12Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>77648</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="157" sha1="6wxtvgn8j8aognjcce6yvp28adbwvhz" xml:space="preserve">{{#css:Mediawiki:Header2.css}}
{{#css:MediaWiki:SiteSpecific.css}}
&lt;nowiki&gt;&lt;/nowiki&gt;
{{#seo:
|title_mode=replace
}}
{{#widget:Header2|page={{FULLPAGENAME}}}}</text>
      <sha1>6wxtvgn8j8aognjcce6yvp28adbwvhz</sha1>
    </revision>
    <revision>
      <id>77650</id>
      <parentid>77648</parentid>
      <timestamp>2022-01-17T13:52:57Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <comment>Blanked the page</comment>
      <origin>77650</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="0" sha1="phoiac9h4m842xq45sp7s6u21eteeq1" xml:space="preserve" />
      <sha1>phoiac9h4m842xq45sp7s6u21eteeq1</sha1>
    </revision>
    <revision>
      <id>77651</id>
      <parentid>77650</parentid>
      <timestamp>2022-01-17T13:53:34Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>77651</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="139" sha1="rzrxmbtjodmc0xxnaw14gczv50vc0n6" xml:space="preserve">{{#css:Mediawiki:Header2.css}}
{{#css:MediaWiki:SiteSpecific.css}}
{{#seo:
|title_mode=replace
}}
{{#widget:Header2|page={{FULLPAGENAME}}}}</text>
      <sha1>rzrxmbtjodmc0xxnaw14gczv50vc0n6</sha1>
    </revision>
    <revision>
      <id>77654</id>
      <parentid>77651</parentid>
      <timestamp>2022-01-17T13:57:32Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>77654</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="134" sha1="n4f67x3yjis0gjn8f9uimhwipvw478h" xml:space="preserve">{{#css:Mediawiki:Header2.css}}{{#css:MediaWiki:SiteSpecific.css}}{{#seo:|title_mode=replace}}{{#widget:Header2|page={{FULLPAGENAME}}}}</text>
      <sha1>n4f67x3yjis0gjn8f9uimhwipvw478h</sha1>
    </revision>
    <revision>
      <id>77718</id>
      <parentid>77654</parentid>
      <timestamp>2022-01-17T16:08:22Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>77718</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="132" sha1="8hgaqlgcgnang4awch1l4uilz399gie" xml:space="preserve">{{#css:Mediawiki:Header.css}}{{#css:MediaWiki:SiteSpecific.css}}{{#seo:|title_mode=replace}}{{#widget:Header|page={{FULLPAGENAME}}}}</text>
      <sha1>8hgaqlgcgnang4awch1l4uilz399gie</sha1>
    </revision>
    <revision>
      <id>78569</id>
      <parentid>77718</parentid>
      <timestamp>2022-01-26T19:35:57Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>78569</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="104" sha1="9t3dbdwlbwqxgag3w3ldubp8yw7wre5" xml:space="preserve">{{#css:Mediawiki:Header.css}}{{#css:MediaWiki:SiteSpecific.css}}{{#widget:Header|page={{FULLPAGENAME}}}}</text>
      <sha1>9t3dbdwlbwqxgag3w3ldubp8yw7wre5</sha1>
    </revision>
    <revision>
      <id>79137</id>
      <parentid>78569</parentid>
      <timestamp>2022-02-02T10:26:06Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>79137</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="145" sha1="r3mgw81rlk7aj0fkjc4f1qstayaze5w" xml:space="preserve">{{#css:Mediawiki:Header.css}}{{#css:MediaWiki:SiteSpecific.css}}{{#widget:Header|page={{FULLPAGENAME|url={{localurl:page name
|query_string}}}}}}</text>
      <sha1>r3mgw81rlk7aj0fkjc4f1qstayaze5w</sha1>
    </revision>
    <revision>
      <id>79139</id>
      <parentid>79137</parentid>
      <timestamp>2022-02-02T10:29:19Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>79139</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="152" sha1="s7qt09smw67hc6vle8ojmmi98rjtuyh" xml:space="preserve">{{#css:Mediawiki:Header.css}}{{#css:MediaWiki:SiteSpecific.css}}{{#widget:Header|page={{FULLPAGENAME|url={{localurl:{{FULLPAGENAME}}
|query_string}}}}}}</text>
      <sha1>s7qt09smw67hc6vle8ojmmi98rjtuyh</sha1>
    </revision>
    <revision>
      <id>79140</id>
      <parentid>79139</parentid>
      <timestamp>2022-02-02T10:29:47Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>79140</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="152" sha1="7cxl768yz9j58wsum8rcw5zad23xjvs" xml:space="preserve">{{#css:Mediawiki:Header.css}}{{#css:MediaWiki:SiteSpecific.css}}{{#widget:Header|page={{FULLPAGENAME}}|url={{localurl:{{FULLPAGENAME}}
|query_string}}}}</text>
      <sha1>7cxl768yz9j58wsum8rcw5zad23xjvs</sha1>
    </revision>
    <revision>
      <id>79141</id>
      <parentid>79140</parentid>
      <timestamp>2022-02-02T10:30:11Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>79141</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="145" sha1="ppd245chcuzkx1pi4waz2zjf41sogjn" xml:space="preserve">{{#css:Mediawiki:Header.css}}{{#css:MediaWiki:SiteSpecific.css}}{{#widget:Header|page={{FULLPAGENAME}}|url={{localurl:page name
|query_string}}}}</text>
      <sha1>ppd245chcuzkx1pi4waz2zjf41sogjn</sha1>
    </revision>
    <revision>
      <id>79142</id>
      <parentid>79141</parentid>
      <timestamp>2022-02-02T10:39:44Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>79142</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="104" sha1="9t3dbdwlbwqxgag3w3ldubp8yw7wre5" xml:space="preserve">{{#css:Mediawiki:Header.css}}{{#css:MediaWiki:SiteSpecific.css}}{{#widget:Header|page={{FULLPAGENAME}}}}</text>
      <sha1>9t3dbdwlbwqxgag3w3ldubp8yw7wre5</sha1>
    </revision>
    <revision>
      <id>79144</id>
      <parentid>79142</parentid>
      <timestamp>2022-02-02T10:47:23Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>79144</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="128" sha1="srvrznz489kta12w2reeg48axb4de4o" xml:space="preserve">{{#css:Mediawiki:Header.css}}{{#css:MediaWiki:SiteSpecific.css}}{{#widget:Header|page={{FULLPAGENAME}}|revision={{REVISIONID}}}}</text>
      <sha1>srvrznz489kta12w2reeg48axb4de4o</sha1>
    </revision>
    <revision>
      <id>79382</id>
      <parentid>79144</parentid>
      <timestamp>2022-02-04T10:33:34Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>79382</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="93" sha1="fcas5otkunuvbv914zk562oxjpvsevr" xml:space="preserve">{{#css:Mediawiki:Header.css}}{{#widget:Header|page={{FULLPAGENAME}}|revision={{REVISIONID}}}}</text>
      <sha1>fcas5otkunuvbv914zk562oxjpvsevr</sha1>
    </revision>
    <revision>
      <id>79385</id>
      <parentid>79382</parentid>
      <timestamp>2022-02-04T10:38:04Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <comment>Undo revision 79382 by [[Special:Contributions/Hans|Hans]] ([[User talk:Hans|talk]])</comment>
      <origin>79385</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="161" sha1="jaw7lt3yuvhoi2dpr6l6k05p64fia2e" xml:space="preserve">{{#css:Mediawiki:Header.css}}{{#css:MediaWiki:SiteSpecific.css}}{{#css:MediaWiki:Sitenotice.css}}{{#widget:Header|page={{FULLPAGENAME}}|revision={{REVISIONID}}}}</text>
      <sha1>jaw7lt3yuvhoi2dpr6l6k05p64fia2e</sha1>
    </revision>
    <revision>
      <id>82024</id>
      <parentid>79385</parentid>
      <timestamp>2022-03-05T11:55:33Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>82024</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="183" sha1="0uz5z063rwdrs5wobwkcvg4tpn0nleh" xml:space="preserve">{{#css:Mediawiki:Header.css}}{{#css:MediaWiki:SiteSpecific.css}}{{#css:MediaWiki:Sitenotice.css}}{{#widget:Header|page={{FULLPAGENAME}}|revision={{REVISIONID}}}}{{#seo:|type=website}}</text>
      <sha1>0uz5z063rwdrs5wobwkcvg4tpn0nleh</sha1>
    </revision>
    <revision>
      <id>82026</id>
      <parentid>82024</parentid>
      <timestamp>2022-03-05T11:58:11Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>82026</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="185" sha1="bh8pflx996og5sdw66zaqyn8tlrjptz" xml:space="preserve">{{#css:Mediawiki:Header.css}}{{#css:MediaWiki:SiteSpecific.css}}{{#css:MediaWiki:Sitenotice.css}}{{#widget:Header|page={{FULLPAGENAME}}|revision={{REVISIONID}}}}{{#seo:
|type=website
}}</text>
      <sha1>bh8pflx996og5sdw66zaqyn8tlrjptz</sha1>
    </revision>
    <revision>
      <id>82691</id>
      <parentid>82026</parentid>
      <timestamp>2022-03-15T09:43:49Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>82691</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="214" sha1="888iwtznyon161u5zjdxwbqjjq5ze1x" xml:space="preserve">{{#css:Mediawiki:Header.css}}{{#css:MediaWiki:SiteSpecific.css}}{{#css:MediaWiki:Sitenotice.css}}{{#widget:Header|page={{FULLPAGENAME}}|revision={{REVISIONID}}}}{{#seo:
|type=website
}}{{#widget:FlyInNotification}}</text>
      <sha1>888iwtznyon161u5zjdxwbqjjq5ze1x</sha1>
    </revision>
    <revision>
      <id>84674</id>
      <parentid>82691</parentid>
      <timestamp>2022-07-26T14:47:31Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>84674</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="463" sha1="eqz9hrs8n1g509iac3rmq7gteu6tfzg" xml:space="preserve">{{#css:Mediawiki:LocalSkin.css}}{{#css:MediaWiki:Sitenotice_LocalSkin.css}}{{#css:Mediawiki:Header.css}}{{#widget:Header
|page={{FULLPAGENAME}}
|revision={{REVISIONID}}
|projectDomainClearnet={{project_clearnet}}
}}{{#seo:
|type=website
}}{{FlyInNotification
|headline=Sorry to interrupt!
|text=Do you use {{project_name}} regularly? Do you want to help sustain and grow the project? Then
|linktext= Learn more about our 10 year success story and maybe donate!
}}</text>
      <sha1>eqz9hrs8n1g509iac3rmq7gteu6tfzg</sha1>
    </revision>
    <revision>
      <id>84728</id>
      <parentid>84674</parentid>
      <timestamp>2022-07-27T12:46:29Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>84728</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="469" sha1="5icyatrj3ro19ropjfs0o9fhkj23lo7" xml:space="preserve">{{#css:Mediawiki:LocalSkin.css}}{{#css:MediaWiki:Sitenotice_LocalSkin.css}}{{#css:Mediawiki:Header.css}}{{#widget:Header
|page={{FULLPAGENAME}}
|revision={{REVISIONID}}
|projectDomainClearnet={{project_clearnet}}
}}{{#seo:
|type=website
}}{{FlyInNotification
|headline=Sorry to interrupt!
|text=Do you use {{project_name_short}} regularly? Do you want to help sustain and grow the project? Then
|linktext= Learn more about our 10 year success story and maybe donate!
}}</text>
      <sha1>5icyatrj3ro19ropjfs0o9fhkj23lo7</sha1>
    </revision>
    <revision>
      <id>85024</id>
      <parentid>84728</parentid>
      <timestamp>2022-08-02T10:20:44Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>85024</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="405" sha1="prhak1mc32i49c4ov6b89lnk3au9pjb" xml:space="preserve">{{#css:/mw-combined-headercss.min.css}}
{{#widget:Header
|page={{FULLPAGENAME}}
|revision={{REVISIONID}}
|projectDomainClearnet={{project_clearnet}}
}}{{#seo:
|type=website
}}{{FlyInNotification
|headline = Sorry to interrupt!
|text = Do you use {{project_name}} regularly? Do you want to help sustain and grow the project? Then 
|linktext = Learn more about our 10 year success story and maybe donate!
}}</text>
      <sha1>prhak1mc32i49c4ov6b89lnk3au9pjb</sha1>
    </revision>
    <revision>
      <id>85032</id>
      <parentid>85024</parentid>
      <timestamp>2022-08-02T10:40:25Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>85032</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="410" sha1="dxlofqlnmctui9tabr1r7bjtt26k39j" xml:space="preserve">{{#css:/mw-combined-headercss.min.css}}
{{#widget:Header
|page={{FULLPAGENAME}}
|revision={{REVISIONID}}
|projectDomainClearnet={{project_clearnet}}
}}{{#seo:
|type=website
}}{{FlyInNotification
|headline = Sorry to interrupt!
|text = Do you use {{project_name_long}} regularly? Do you want to help sustain and grow the project? Then 
|linktext = Learn more about our 10 year success story and maybe donate!
}}</text>
      <sha1>dxlofqlnmctui9tabr1r7bjtt26k39j</sha1>
    </revision>
    <revision>
      <id>85034</id>
      <parentid>85032</parentid>
      <timestamp>2022-08-02T11:05:22Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>85034</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="411" sha1="4osc8avp2qehuxphg363q7zfkg6qotm" xml:space="preserve">{{#css:/mw-combined-headercss.min.css}}
{{#widget:Header
|page={{FULLPAGENAME}}
|revision={{REVISIONID}}
|projectDomainClearnet={{project_clearnet}}
}}{{#seo:
|type=website
}}{{FlyInNotification
|headline = Sorry to interrupt!
|text = Do you use {{project_name_short}} regularly? Do you want to help sustain and grow the project? Then 
|linktext = Learn more about our 10 year success story and maybe donate!
}}</text>
      <sha1>4osc8avp2qehuxphg363q7zfkg6qotm</sha1>
    </revision>
    <revision>
      <id>85276</id>
      <parentid>85034</parentid>
      <timestamp>2022-08-05T09:00:19Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>85276</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="410" sha1="lrjd26k2ejkkjpkn1llnqcmfg6ecmvh" xml:space="preserve">{{#css:/mw-combined-headercss.min.css}}{{#widget:Header
|page={{FULLPAGENAME}}
|revision={{REVISIONID}}
|projectDomainClearnet={{project_clearnet}}
}}{{#seo:
|type=website
}}{{FlyInNotification
|headline = Sorry to interrupt!
|text = Do you use {{project_name_short}} regularly? Do you want to help sustain and grow the project? Then 
|linktext = Learn more about our 10 year success story and maybe donate!
}}</text>
      <sha1>lrjd26k2ejkkjpkn1llnqcmfg6ecmvh</sha1>
    </revision>
    <revision>
      <id>85763</id>
      <parentid>85276</parentid>
      <timestamp>2022-08-12T15:26:27Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>remove-trailing-spaces</comment>
      <origin>85763</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="409" sha1="bubm2ufjm3nl8gu9w9es5v2rrv46iyv" xml:space="preserve">{{#css:/mw-combined-headercss.min.css}}{{#widget:Header
|page={{FULLPAGENAME}}
|revision={{REVISIONID}}
|projectDomainClearnet={{project_clearnet}}
}}{{#seo:
|type=website
}}{{FlyInNotification
|headline = Sorry to interrupt!
|text = Do you use {{project_name_short}} regularly? Do you want to help sustain and grow the project? Then
|linktext = Learn more about our 10 year success story and maybe donate!
}}</text>
      <sha1>bubm2ufjm3nl8gu9w9es5v2rrv46iyv</sha1>
    </revision>
    <revision>
      <id>89124</id>
      <parentid>85763</parentid>
      <timestamp>2022-10-28T10:06:01Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89124</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="404" sha1="2vr271ji2ddo82sxy7h2vqdngker21n" xml:space="preserve">{{#css:/mw-combined-skin.min.css}}{{#widget:Header
|page={{FULLPAGENAME}}
|revision={{REVISIONID}}
|projectDomainClearnet={{project_clearnet}}
}}{{#seo:
|type=website
}}{{FlyInNotification
|headline = Sorry to interrupt!
|text = Do you use {{project_name_short}} regularly? Do you want to help sustain and grow the project? Then
|linktext = Learn more about our 10 year success story and maybe donate!
}}</text>
      <sha1>2vr271ji2ddo82sxy7h2vqdngker21n</sha1>
    </revision>
    <revision>
      <id>89125</id>
      <parentid>89124</parentid>
      <timestamp>2022-10-28T10:06:55Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89125</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="407" sha1="ep7q22qz8zijazve39ca5eizxpluyoe" xml:space="preserve">{{#css:/mw-combined-skincss.min.css}}{{#widget:Header
|page={{FULLPAGENAME}}
|revision={{REVISIONID}}
|projectDomainClearnet={{project_clearnet}}
}}{{#seo:
|type=website
}}{{FlyInNotification
|headline = Sorry to interrupt!
|text = Do you use {{project_name_short}} regularly? Do you want to help sustain and grow the project? Then
|linktext = Learn more about our 10 year success story and maybe donate!
}}</text>
      <sha1>ep7q22qz8zijazve39ca5eizxpluyoe</sha1>
    </revision>
    <revision>
      <id>89450</id>
      <parentid>89125</parentid>
      <timestamp>2022-11-15T11:59:39Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89450</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="408" sha1="3rvk4fivf52xocvrp245368yjhs035k" xml:space="preserve">{{#css:/mw-combined-skincss.min.css}}{{#widget:Header
|page={{FULLPAGENAME}}
|revision={{REVISIONID}}
|projectDomainClearnet={{project_clearnet}}
}} {{#seo:
|type=website
}}{{FlyInNotification
|headline = Sorry to interrupt!
|text = Do you use {{project_name_short}} regularly? Do you want to help sustain and grow the project? Then
|linktext = Learn more about our 10 year success story and maybe donate!
}}</text>
      <sha1>3rvk4fivf52xocvrp245368yjhs035k</sha1>
    </revision>
    <revision>
      <id>92196</id>
      <parentid>89450</parentid>
      <timestamp>2023-01-20T14:41:59Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>92196</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="454" sha1="ft3wmotizsd19gmvl1cwk9m4no5uy21" xml:space="preserve">{{#css:/mw-combined-skincss.min.css}}{{#widget:Header
|page={{FULLPAGENAME}}
|revision={{REVISIONID}}
|projectDomainClearnet={{project_clearnet}}
|textLogo=/w/images/c/c1/Whonix-logo-text.svg
}} {{#seo:
|type=website
}}{{FlyInNotification
|headline = Sorry to interrupt!
|text = Do you use {{project_name_short}} regularly? Do you want to help sustain and grow the project? Then
|linktext = Learn more about our 10 year success story and maybe donate!
}}</text>
      <sha1>ft3wmotizsd19gmvl1cwk9m4no5uy21</sha1>
    </revision>
    <revision>
      <id>92257</id>
      <parentid>92196</parentid>
      <timestamp>2023-01-23T14:24:31Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>92257</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="496" sha1="tphmf2c289o8nqyfio62hoo87stqfoz" xml:space="preserve">{{#css:/mw-combined-skincss.min.css}}{{#widget:Header
|page={{FULLPAGENAME}}
|revision={{REVISIONID}}
|projectDomainClearnet={{project_clearnet}}
|textLogoAttributes= src="/w/images/c/c1/Whonix-logo-text.svg" width="135" height="32" 
}} {{#seo:
|type=website
}}{{FlyInNotification
|headline = Sorry to interrupt!
|text = Do you use {{project_name_short}} regularly? Do you want to help sustain and grow the project? Then
|linktext = Learn more about our 10 year success story and maybe donate!
}}</text>
      <sha1>tphmf2c289o8nqyfio62hoo87stqfoz</sha1>
    </revision>
    <revision>
      <id>92296</id>
      <parentid>92257</parentid>
      <timestamp>2023-01-23T19:06:37Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>92296</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="524" sha1="1o622lhq4ols89rvpcq9jx0cvwccciz" xml:space="preserve">{{#css:/mw-combined-skincss.min.css}}{{#widget:Header
|page={{FULLPAGENAME}}
|revision={{REVISIONID}}
|projectDomainClearnet={{project_clearnet}}
|textLogoAttributes= src="/w/images/c/c1/Whonix-logo-text.svg" width="135" height="32" alt="{{project_name_short}}"
}} {{#seo:
|type=website
}}{{FlyInNotification
|headline = Sorry to interrupt!
|text = Do you use {{project_name_short}} regularly? Do you want to help sustain and grow the project? Then
|linktext = Learn more about our 10 year success story and maybe donate!
}}</text>
      <sha1>1o622lhq4ols89rvpcq9jx0cvwccciz</sha1>
    </revision>
    <revision>
      <id>92814</id>
      <parentid>92296</parentid>
      <timestamp>2023-03-01T16:58:45Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>92814</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="507" sha1="dx1zi6ilh6z8krisnwkumoc2f9cgfgy" xml:space="preserve">{{HeaderMultiWiki}} {{#widget:Header
|page={{FULLPAGENAME}}
|revision={{REVISIONID}}
|projectDomainClearnet={{project_clearnet}}
|textLogoAttributes= src="/w/images/c/c1/Whonix-logo-text.svg" width="135" height="32" alt="{{project_name_short}}"
}} {{#seo:
|type=website
}}{{FlyInNotification
|headline = Sorry to interrupt!
|text = Do you use {{project_name_short}} regularly? Do you want to help sustain and grow the project? Then
|linktext = Learn more about our 10 year success story and maybe donate!
}}</text>
      <sha1>dx1zi6ilh6z8krisnwkumoc2f9cgfgy</sha1>
    </revision>
    <revision>
      <id>92815</id>
      <parentid>92814</parentid>
      <timestamp>2023-03-01T16:58:56Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>92815</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="506" sha1="3vrfcpap6fczbbjjdp2xb2q9sut758d" xml:space="preserve">{{HeaderMultiWiki}}{{#widget:Header
|page={{FULLPAGENAME}}
|revision={{REVISIONID}}
|projectDomainClearnet={{project_clearnet}}
|textLogoAttributes= src="/w/images/c/c1/Whonix-logo-text.svg" width="135" height="32" alt="{{project_name_short}}"
}} {{#seo:
|type=website
}}{{FlyInNotification
|headline = Sorry to interrupt!
|text = Do you use {{project_name_short}} regularly? Do you want to help sustain and grow the project? Then
|linktext = Learn more about our 10 year success story and maybe donate!
}}</text>
      <sha1>3vrfcpap6fczbbjjdp2xb2q9sut758d</sha1>
    </revision>
    <revision>
      <id>93724</id>
      <parentid>92815</parentid>
      <timestamp>2023-05-05T09:24:19Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>93724</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="741" sha1="ci8irgrdgnto16cvql5owpu8qyis6ru" xml:space="preserve">{{HeaderMultiWiki}}{{#widget:Header
|page={{FULLPAGENAME}}
|revision={{REVISIONID}}
|projectDomainClearnet={{project_clearnet}}
|textLogoAttributes= src="/w/images/c/c1/Whonix-logo-text.svg" width="135" height="32" alt="{{project_name_short}}"
}} {{#seo:
|type=website
}}{{FlyInNotification
|imgSrc=/w/images/thumb/e/e8/Flyin-donate-promo.jpg/300px-Flyin-donate-promo.jpg
|imgWidth=300
|imgHeight=215
|imgLink=/wiki/Donate
|headline=Your support makes&lt;br&gt;all the difference!
|html=We believe security software like {{project_name_short}} needs to remain open source and independent. &lt;b&gt;Would you help&lt;/b&gt; sustain and grow the project? Learn more about our &lt;a href="/wiki/Donate" target="_blank"&gt;10 year success story and maybe DONATE!&lt;/a&gt;
}}</text>
      <sha1>ci8irgrdgnto16cvql5owpu8qyis6ru</sha1>
    </revision>
    <revision>
      <id>93784</id>
      <parentid>93724</parentid>
      <timestamp>2023-05-06T10:54:41Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>93784</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="271" sha1="lor7bi4x1euf2edlo843ssdgumnf6pl" xml:space="preserve">{{HeaderMultiWiki}}{{#widget:Header
|page={{FULLPAGENAME}}
|revision={{REVISIONID}}
|projectDomainClearnet={{project_clearnet}}
|textLogoAttributes= src="/w/images/c/c1/Whonix-logo-text.svg" width="135" height="32" alt="{{project_name_short}}"
}} {{#seo:
|type=website
}}</text>
      <sha1>lor7bi4x1euf2edlo843ssdgumnf6pl</sha1>
    </revision>
    <revision>
      <id>95741</id>
      <parentid>93784</parentid>
      <timestamp>2023-08-23T09:35:44Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>95741</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="310" sha1="1b4b4ry75v0v8d8rz22wrw9uy9iqvdb" xml:space="preserve">{{HeaderMultiWiki}}
{{#seo:
|type=website
}}
{{#widget:HeaderMultiWiki
|part=1
|textLogoAttributes= src="/w/images/c/c1/Whonix-logo-text.svg" width="135" height="32" alt="{{project_name_short}}"
}}
{{#widget:Header
|part=1
}}
{{#widget:HeaderMultiWiki
|part=1
|page={{FULLPAGENAME}}
|revision={{REVISIONID}}
}}</text>
      <sha1>1b4b4ry75v0v8d8rz22wrw9uy9iqvdb</sha1>
    </revision>
    <revision>
      <id>95743</id>
      <parentid>95741</parentid>
      <timestamp>2023-08-23T09:39:28Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>95743</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="310" sha1="ckh0nym5v81tobzjlgjtpmbja74uau6" xml:space="preserve">{{HeaderMultiWiki}}
{{#seo:
|type=website
}}
{{#widget:HeaderMultiWiki
|part=1
|textLogoAttributes= src="/w/images/c/c1/Whonix-logo-text.svg" width="135" height="32" alt="{{project_name_short}}"
}}
{{#widget:Header
|part=1
}}
{{#widget:HeaderMultiWiki
|part=2
|page={{FULLPAGENAME}}
|revision={{REVISIONID}}
}}</text>
      <sha1>ckh0nym5v81tobzjlgjtpmbja74uau6</sha1>
    </revision>
    <revision>
      <id>95745</id>
      <parentid>95743</parentid>
      <timestamp>2023-08-23T09:40:42Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>95745</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="306" sha1="j0wpaohw7q916tj2j05udofwkr28rcp" xml:space="preserve">{{HeaderMultiWiki}}{{#seo:
|type=website
}}{{#widget:HeaderMultiWiki
|part=1
|textLogoAttributes= src="/w/images/c/c1/Whonix-logo-text.svg" width="135" height="32" alt="{{project_name_short}}"
}}{{#widget:Header
|part=1
}}{{#widget:HeaderMultiWiki
|part=2
|page={{FULLPAGENAME}}
|revision={{REVISIONID}}
}}</text>
      <sha1>j0wpaohw7q916tj2j05udofwkr28rcp</sha1>
    </revision>
    <revision>
      <id>95746</id>
      <parentid>95745</parentid>
      <timestamp>2023-08-23T10:20:07Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>95746</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="332" sha1="3xfr0us8wefr6xui0needj9wouwkzvb" xml:space="preserve">{{GoogleOff | content=
{{HeaderMultiWiki}}{{#seo:
|type=website
}}{{#widget:HeaderMultiWiki
|part=1
|textLogoAttributes= src="/w/images/c/c1/Whonix-logo-text.svg" width="135" height="32" alt="{{project_name_short}}"
}}{{#widget:Header
|part=1
}}{{#widget:HeaderMultiWiki
|part=2
|page={{FULLPAGENAME}}
|revision={{REVISIONID}}
}}
}}</text>
      <sha1>3xfr0us8wefr6xui0needj9wouwkzvb</sha1>
    </revision>
    <revision>
      <id>95748</id>
      <parentid>95746</parentid>
      <timestamp>2023-08-23T10:28:16Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>95748</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="216" sha1="0f5h0dmrdflc0rr0kvoy3vmtqnb0xj0" xml:space="preserve">{{GoogleOff | content=
{{HeaderMultiWiki}}{{#seo:
|type=website
}}{{#widget:HeaderMultiWiki
|part=1
}}{{#widget:Header
|part=1
}}{{#widget:HeaderMultiWiki
|part=2
|page={{FULLPAGENAME}}
|revision={{REVISIONID}}
}}
}}</text>
      <sha1>0f5h0dmrdflc0rr0kvoy3vmtqnb0xj0</sha1>
    </revision>
    <revision>
      <id>95755</id>
      <parentid>95748</parentid>
      <timestamp>2023-08-23T12:17:23Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>95755</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="441" sha1="thxwogkrfo0u9tznl8ioxhvpi4ic83d" xml:space="preserve">{{GoogleOff | content=
{{#css:/mw-combined-skincss.min.css }}{{#css:
body.ctbc_hide-sitenotice-{{Sitenotice_id}}_true #siteNotice .sitenotice-body[data-sitenotice-id="{{Sitenotice_id}}"] { display: none !important; }
}}{{#seo:
|type=website
}}{{#widget:HeaderMultiWiki
|part=1
}}{{#widget:Header
|part=1
}}{{#widget:HeaderMultiWiki
|part=2
|page={{FULLPAGENAME}}
|revision={{REVISIONID}}
}}
}}
&lt;noinclude&gt;
[[Category:MultiWiki]]
&lt;/noinclude&gt;</text>
      <sha1>thxwogkrfo0u9tznl8ioxhvpi4ic83d</sha1>
    </revision>
    <revision>
      <id>95756</id>
      <parentid>95755</parentid>
      <timestamp>2023-08-23T12:21:34Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>95756</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="432" sha1="8rne5gz9qfntpjsosph01xpffai0ubv" xml:space="preserve">{{GoogleOff | content=
{{#css:/mw-combined-skincss.min.css }}{{#css:
body.ctbc_hide-sitenotice-{{Sitenotice_id}}_true #siteNotice .sitenotice-body[data-sitenotice-id="{{Sitenotice_id}}"] { display: none !important; }
}}{{#seo:
|type=website
}}{{#widget:Header
|part=1
}}{{#widget:HeaderLocalWiki
|part=1
}}{{#widget:Header
|part=2
|page={{FULLPAGENAME}}
|revision={{REVISIONID}}
}}
}}
&lt;noinclude&gt;
[[Category:MultiWiki]]
&lt;/noinclude&gt;</text>
      <sha1>8rne5gz9qfntpjsosph01xpffai0ubv</sha1>
    </revision>
    <revision>
      <id>98731</id>
      <parentid>95756</parentid>
      <timestamp>2024-01-31T14:55:28Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>mediawiki-shell-bot-mirror-multi-wiki-page-from-kicksecure-to-whonix</comment>
      <origin>98731</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="456" sha1="hf0do25zmro9yn990poxyjmer04gcmv" xml:space="preserve">{{GoogleOff | content=
{{#css:/mw-combined-skincss.min.css?hsversion={{Hsversion}} }}{{#css:
body.ctbc_hide-sitenotice-{{Sitenotice_id}}_true #siteNotice .sitenotice-body[data-sitenotice-id="{{Sitenotice_id}}"] { display: none !important; }
}}{{#seo:
|type=website
}}{{#widget:Header
|part=1
}}{{#widget:HeaderLocalWiki
|part=1
}}{{#widget:Header
|part=2
|page={{FULLPAGENAME}}
|revision={{REVISIONID}}
}}
}}
&lt;noinclude&gt;
[[Category:MultiWiki]]
&lt;/noinclude&gt;</text>
      <sha1>hf0do25zmro9yn990poxyjmer04gcmv</sha1>
    </revision>
    <revision>
      <id>101953</id>
      <parentid>98731</parentid>
      <timestamp>2024-10-10T09:18:01Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>mediawiki-shell-bot-mirror-multi-wiki-page-from-kicksecure-to-whonix</comment>
      <origin>101953</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="431" sha1="pm8urbtcq880rxcx0a4jll9qihlvmh8" xml:space="preserve">{{GoogleOff | content=
{{#css:/mw-combined-skincss.min.css}}{{#css:
body.ctbc_hide-sitenotice-{{Sitenotice_id}}_true #siteNotice .sitenotice-body[data-sitenotice-id="{{Sitenotice_id}}"] { display: none !important; }
}}{{#seo:
|type=website
}}{{#widget:Header
|part=1
}}{{#widget:HeaderLocalWiki
|part=1
}}{{#widget:Header
|part=2
|page={{FULLPAGENAME}}
|revision={{REVISIONID}}
}}
}}
&lt;noinclude&gt;
[[Category:MultiWiki]]
&lt;/noinclude&gt;</text>
      <sha1>pm8urbtcq880rxcx0a4jll9qihlvmh8</sha1>
    </revision>
    <revision>
      <id>103178</id>
      <parentid>101953</parentid>
      <timestamp>2025-03-24T13:38:03Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>103178</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="532" sha1="tk01bct3t2w3qyla9bdd66dwwo28afp" xml:space="preserve">{{GoogleOff | content=
{{#css:/mw-combined-skincss.min.css}}{{#css:
body.ctbc_hide-sitenotice-{{Sitenotice_id}}_true #siteNotice .sitenotice-banner[data-banner-id="{{Sitenotice_id}}"] { display: none !important; }
#siteNotice .sitenotice-banner:not([data-banner-id="{{Sitenotice_id}}"]) { display: none !important; }
}}{{#seo:
|type=website
}}{{#widget:Header
|part=1
}}{{#widget:HeaderLocalWiki
|part=1
}}{{#widget:Header
|part=2
|page={{FULLPAGENAME}}
|revision={{REVISIONID}}
}}
}}
&lt;noinclude&gt;
[[Category:MultiWiki]]
&lt;/noinclude&gt;</text>
      <sha1>tk01bct3t2w3qyla9bdd66dwwo28afp</sha1>
    </revision>
  </page>
  <page>
    <title>Template:Footer</title>
    <ns>10</ns>
    <id>15</id>
    <revision>
      <id>32</id>
      <timestamp>2013-06-27T15:15:30Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <comment>Created page with "&lt;!--Blank for now--&gt;"</comment>
      <origin>32</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="20" sha1="5uaw0vkkohacmk3h47991c0nx1r9gh1" xml:space="preserve">&lt;!--Blank for now--&gt;</text>
      <sha1>5uaw0vkkohacmk3h47991c0nx1r9gh1</sha1>
    </revision>
    <revision>
      <id>87</id>
      <parentid>32</parentid>
      <timestamp>2013-06-27T21:57:52Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>87</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="314" sha1="inkzf1xnzlwr4pjmfvgob39kkahr632" xml:space="preserve">This is a wiki. Want to improve this page? Contact us!

&lt;font size="-3"&gt;Unless otherwise noted above, content of this particular page is copyrighted by [mailto:adrelanos@riseupDOTnet adrelanos] and licensed under the same Free (as in speech) license as Whonix itself.&lt;/font&gt;

[[File:Whonix-ad.png|options|caption]]</text>
      <sha1>inkzf1xnzlwr4pjmfvgob39kkahr632</sha1>
    </revision>
    <revision>
      <id>88</id>
      <parentid>87</parentid>
      <timestamp>2013-06-27T21:59:14Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>88</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="326" sha1="b3ifrg9ma1ph4p85hk121u4yx2azfyz" xml:space="preserve">= Footer =

This is a wiki. Want to improve this page? Contact us!

&lt;font size="-3"&gt;Unless otherwise noted above, content of this particular page is copyrighted by [mailto:adrelanos@riseupDOTnet adrelanos] and licensed under the same Free (as in speech) license as Whonix itself.&lt;/font&gt;

[[File:Whonix-ad.png|options|caption]]</text>
      <sha1>b3ifrg9ma1ph4p85hk121u4yx2azfyz</sha1>
    </revision>
    <revision>
      <id>716</id>
      <parentid>88</parentid>
      <timestamp>2013-07-10T09:15:31Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>716</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="340" sha1="kvsgh5212egs2aq4fery3riw68dr7sw" xml:space="preserve">= Footer =

This is a wiki. Want to improve this page? [[Contact | Contact us!]]

&lt;font size="-3"&gt;Unless otherwise noted above, content of this particular page is copyrighted by [mailto:adrelanos@riseupDOTnet adrelanos] and licensed under the same Free (as in speech) license as Whonix itself.&lt;/font&gt;

[[File:Whonix-ad.png|options|caption]]</text>
      <sha1>kvsgh5212egs2aq4fery3riw68dr7sw</sha1>
    </revision>
    <revision>
      <id>720</id>
      <parentid>716</parentid>
      <timestamp>2013-07-10T09:57:37Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>720</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="457" sha1="50c2hqvk0zx2uwggxtqppsmwf9cgq1b" xml:space="preserve">= Footer =

This is a wiki. Want to improve this page? Edit it using the link in the top right! IP addresses are scrubbed, but editing over Tor is recommended.

Questions? [[Contact | Contact us!]]

&lt;font size="-3"&gt;Unless otherwise noted above, content of this particular page is copyrighted by [mailto:adrelanos@riseupDOTnet adrelanos] and licensed under the same Free (as in speech) license as Whonix itself.&lt;/font&gt;

[[File:Whonix-ad.png|options|caption]]</text>
      <sha1>50c2hqvk0zx2uwggxtqppsmwf9cgq1b</sha1>
    </revision>
    <revision>
      <id>721</id>
      <parentid>720</parentid>
      <timestamp>2013-07-10T10:02:29Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>721</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="498" sha1="5q2fblow1v29dw4icunspucyyp4t0e0" xml:space="preserve">= Footer =

This is a wiki. Want to improve this page? Edit it using the link in the top right! IP addresses are scrubbed, but editing over Tor is recommended.

Questions? [[Contact | Contact us!]]

Note: IP edits are held for moderation.

&lt;font size="-3"&gt;Unless otherwise noted above, content of this particular page is copyrighted by [mailto:adrelanos@riseupDOTnet adrelanos] and licensed under the same Free (as in speech) license as Whonix itself.&lt;/font&gt;

[[File:Whonix-ad.png|options|caption]]</text>
      <sha1>5q2fblow1v29dw4icunspucyyp4t0e0</sha1>
    </revision>
    <revision>
      <id>1260</id>
      <parentid>721</parentid>
      <timestamp>2013-07-12T21:28:54Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>1260</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="736" sha1="pdhybrxr6upx7un43xwa56i99h8vm46" xml:space="preserve">= Footer =

This is a wiki. Want to improve this page? Edit it using the link in the top right! IP addresses are scrubbed, but editing over Tor is recommended.

Questions? [[Contact | Contact us!]]

Note: IP edits are held for moderation.

&lt;font size="-3"&gt;Unless otherwise noted above, content of this particular page is copyrighted by [mailto:adrelanos@riseupDOTnet adrelanos] and licensed under the same Free (as in speech) license as Whonix itself.&lt;/font&gt;

[[Image:OIN_logo_200px.png|left|frame|link=http://www.openinventionnetwork.com|Whonix is a [http://www.openinventionnetwork.com/licensees.php licensee] of the [https://en.wikipedia.org/wiki/Open_Invention_Network Open Invention Network].]]

[[File:Whonix-ad.png|left|caption]]</text>
      <sha1>pdhybrxr6upx7un43xwa56i99h8vm46</sha1>
    </revision>
    <revision>
      <id>1470</id>
      <parentid>1260</parentid>
      <timestamp>2013-07-17T19:13:33Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>1470</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="560" sha1="kyo2yos1ieimked18kqiqinpj7jxuvk" xml:space="preserve">= Footer =

This is a wiki. Want to improve this page? Edit it using the link in the top right! IP addresses are scrubbed, but editing over Tor is recommended.

Questions? [[Contact | Contact us!]]

Note: IP edits are held for moderation.

&lt;font size="-3"&gt;Unless otherwise noted above, content of this particular page is copyrighted by [mailto:adrelanos@riseupDOTnet adrelanos] and licensed under the same Free (as in speech) license as Whonix itself.&lt;/font&gt;

&lt;gallery&gt;
Image:donate.png|link=Contribute#Donate|[[Contribute#Donate|Donate to Whonix!]]
&lt;/gallery&gt;</text>
      <sha1>kyo2yos1ieimked18kqiqinpj7jxuvk</sha1>
    </revision>
    <revision>
      <id>1476</id>
      <parentid>1470</parentid>
      <timestamp>2013-07-17T19:22:07Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Footer */</comment>
      <origin>1476</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="549" sha1="7mtq8lhmuzgladl6l1drk8s9u0gn9jm" xml:space="preserve">= Footer =

This is a wiki. Want to improve this page? Edit it using the link in the top right! IP addresses are scrubbed, but editing over Tor is recommended.

Questions? [[Contact | Contact us!]]

Note: IP edits are held for moderation.

&lt;font size="-3"&gt;Unless otherwise noted above, content of this particular page is copyrighted by [mailto:adrelanos@riseupDOTnet adrelanos] and licensed under the same Free (as in speech) license as Whonix itself.&lt;/font&gt;

&lt;gallery&gt;
Image:donate.png|link=Contribute#Donate|[[Donate|Donate to Whonix!]]
&lt;/gallery&gt;</text>
      <sha1>7mtq8lhmuzgladl6l1drk8s9u0gn9jm</sha1>
    </revision>
    <revision>
      <id>1479</id>
      <parentid>1476</parentid>
      <timestamp>2013-07-17T19:32:30Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Footer */</comment>
      <origin>1479</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="538" sha1="8vfrhlfj1j3kyun4l41tp7gfmcxm3rd" xml:space="preserve">= Footer =

This is a wiki. Want to improve this page? Edit it using the link in the top right! IP addresses are scrubbed, but editing over Tor is recommended.

Questions? [[Contact | Contact us!]]

Note: IP edits are held for moderation.

&lt;font size="-3"&gt;Unless otherwise noted above, content of this particular page is copyrighted by [mailto:adrelanos@riseupDOTnet adrelanos] and licensed under the same Free (as in speech) license as Whonix itself.&lt;/font&gt;

&lt;gallery&gt;
Image:donate.png|link=Donate|[[Donate|Donate to Whonix!]]
&lt;/gallery&gt;</text>
      <sha1>8vfrhlfj1j3kyun4l41tp7gfmcxm3rd</sha1>
    </revision>
    <revision>
      <id>1773</id>
      <parentid>1479</parentid>
      <timestamp>2013-07-25T18:31:17Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <origin>1773</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="561" sha1="ro3qulpsqyg2oowzsfyb823h459n2tx" xml:space="preserve">= Footer =

&lt;font size="-3"&gt;This is a wiki. Want to improve this page? Edit it using the link in the top right! IP addresses are scrubbed, but editing over Tor is recommended.

Questions? [[Contact | Contact us!]]

Note: IP edits are held for moderation.&lt;/font&gt;

&lt;font size="-3"&gt;Unless otherwise noted above, content of this particular page is copyrighted by [mailto:adrelanos@riseupDOTnet adrelanos] and licensed under the same Free (as in speech) license as Whonix itself.&lt;/font&gt;

&lt;gallery&gt;
Image:donate.png|link=Donate|[[Donate|Donate to Whonix!]]
&lt;/gallery&gt;</text>
      <sha1>ro3qulpsqyg2oowzsfyb823h459n2tx</sha1>
    </revision>
    <revision>
      <id>1776</id>
      <parentid>1773</parentid>
      <timestamp>2013-07-25T21:43:55Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <comment>adjust per talk page</comment>
      <origin>1776</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="535" sha1="m0766fllpqs0kjgpq355nffld49bzjo" xml:space="preserve">= Footer =

&lt;font size="-3"&gt;This is a wiki. Want to improve this page? Edit it using the link in the top right! IP addresses are scrubbed, but editing over Tor is recommended.

Questions? [[Contact | Contact us!]]

Note: IP edits are held for moderation.&lt;/font&gt;

&lt;font size="-3"&gt;Unless otherwise noted above, content of this particular page is copyrighted by [mailto:adrelanos@riseupDOTnet adrelanos] and licensed under the same Free (as in speech) license as Whonix itself.&lt;/font&gt;
&lt;font size="-3"&gt;
[[Donate|Donate to Whonix!]]
&lt;/font&gt;</text>
      <sha1>m0766fllpqs0kjgpq355nffld49bzjo</sha1>
    </revision>
    <revision>
      <id>1787</id>
      <parentid>1776</parentid>
      <timestamp>2013-07-25T23:04:52Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>1787</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="536" sha1="eigu67i00pk413ztbt5h64gb4u9elnr" xml:space="preserve">= Footer =

&lt;font size="-3"&gt;This is a wiki. Want to improve this page? Edit it using the link in the top right! IP addresses are scrubbed, but editing over Tor is recommended.

Questions? [[Contact | Contact us!]]

Note: IP edits are held for moderation.&lt;/font&gt;

&lt;font size="-3"&gt;Unless otherwise noted above, content of this particular page is copyrighted by [mailto:adrelanos@riseupDOTnet adrelanos] and licensed under the same Free (as in speech) license as Whonix itself.&lt;/font&gt;

&lt;font size="-3"&gt;
[[Donate|Donate to Whonix!]]
&lt;/font&gt;</text>
      <sha1>eigu67i00pk413ztbt5h64gb4u9elnr</sha1>
    </revision>
    <revision>
      <id>1883</id>
      <parentid>1787</parentid>
      <timestamp>2013-07-28T17:44:38Z</timestamp>
      <contributor>
        <username>Anon</username>
        <id>10</id>
      </contributor>
      <comment>/* Footer */</comment>
      <origin>1883</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="529" sha1="gild0r8ltxcj60b4b0bcmflwcnk2yjk" xml:space="preserve">= =

&lt;font size="-3"&gt;This is a wiki. Want to improve this page? Edit it using the link in the top right! IP addresses are scrubbed, but editing over Tor is recommended.

Questions? [[Contact | Contact us!]]

Note: IP edits are held for moderation.&lt;/font&gt;

&lt;font size="-3"&gt;Unless otherwise noted above, content of this particular page is copyrighted by [mailto:adrelanos@riseupDOTnet adrelanos] and licensed under the same Free (as in speech) license as Whonix itself.&lt;/font&gt;

&lt;font size="-3"&gt;
[[Donate|Donate to Whonix!]]
&lt;/font&gt;</text>
      <sha1>gild0r8ltxcj60b4b0bcmflwcnk2yjk</sha1>
    </revision>
    <revision>
      <id>1884</id>
      <parentid>1883</parentid>
      <timestamp>2013-07-28T17:51:18Z</timestamp>
      <contributor>
        <username>Anon</username>
        <id>10</id>
      </contributor>
      <origin>1884</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="530" sha1="n205mk3ah6nwawloy6d80q090frcvyf" xml:space="preserve">&lt;hr&gt;

&lt;font size="-3"&gt;This is a wiki. Want to improve this page? Edit it using the link in the top right! IP addresses are scrubbed, but editing over Tor is recommended.

Questions? [[Contact | Contact us!]]

Note: IP edits are held for moderation.&lt;/font&gt;

&lt;font size="-3"&gt;Unless otherwise noted above, content of this particular page is copyrighted by [mailto:adrelanos@riseupDOTnet adrelanos] and licensed under the same Free (as in speech) license as Whonix itself.&lt;/font&gt;

&lt;font size="-3"&gt;
[[Donate|Donate to Whonix!]]
&lt;/font&gt;</text>
      <sha1>n205mk3ah6nwawloy6d80q090frcvyf</sha1>
    </revision>
    <revision>
      <id>1885</id>
      <parentid>1884</parentid>
      <timestamp>2013-07-28T17:59:00Z</timestamp>
      <contributor>
        <username>Anon</username>
        <id>10</id>
      </contributor>
      <origin>1885</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="536" sha1="aw31qxi1vv3du00p2ti2jh5hm42xv2z" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;

&lt;font size="-3"&gt;This is a wiki. Want to improve this page? Edit it using the link in the top right! IP addresses are scrubbed, but editing over Tor is recommended.

Questions? [[Contact | Contact us!]]

Note: IP edits are held for moderation.&lt;/font&gt;

&lt;font size="-3"&gt;Unless otherwise noted above, content of this particular page is copyrighted by [mailto:adrelanos@riseupDOTnet adrelanos] and licensed under the same Free (as in speech) license as Whonix itself.&lt;/font&gt;

&lt;font size="-3"&gt;
[[Donate|Donate to Whonix!]]
&lt;/font&gt;</text>
      <sha1>aw31qxi1vv3du00p2ti2jh5hm42xv2z</sha1>
    </revision>
    <revision>
      <id>1936</id>
      <parentid>1885</parentid>
      <timestamp>2013-07-29T05:45:34Z</timestamp>
      <contributor>
        <username>Anon</username>
        <id>10</id>
      </contributor>
      <comment>Trying edit link</comment>
      <origin>1936</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="586" sha1="tnflx7dk008nmrw1vs9wni8rhz0jwxv" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;

&lt;font size="-3"&gt;This is a wiki. Want to improve this page? &lt;html&gt;&lt;a href="&lt;/html&gt;{{localurl:{{FULLPAGENAME}}|action=edit}}&lt;html&gt;"&gt;Edit&lt;/a&gt;&lt;/html&gt; it! IP addresses are scrubbed, but editing over Tor is recommended.

Questions? [[Contact | Contact us!]]

Note: IP edits are held for moderation.&lt;/font&gt;

&lt;font size="-3"&gt;Unless otherwise noted above, content of this particular page is copyrighted by [mailto:adrelanos@riseupDOTnet adrelanos] and licensed under the same Free (as in speech) license as Whonix itself.&lt;/font&gt;

&lt;font size="-3"&gt;
[[Donate|Donate to Whonix!]]
&lt;/font&gt;</text>
      <sha1>tnflx7dk008nmrw1vs9wni8rhz0jwxv</sha1>
    </revision>
    <revision>
      <id>2279</id>
      <parentid>1936</parentid>
      <timestamp>2013-08-10T20:06:32Z</timestamp>
      <contributor>
        <username>Anon</username>
        <id>10</id>
      </contributor>
      <origin>2279</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="521" sha1="qp9t2yag5bepkk9rd7tdwkv4m3b9060" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;

&lt;font size="-3"&gt;This is a wiki. Want to improve this page? &lt;html&gt;&lt;a href="&lt;/html&gt;{{localurl:{{FULLPAGENAME}}|action=edit}}&lt;html&gt;"&gt;Edit&lt;/a&gt;&lt;/html&gt; it! IP addresses are scrubbed, but editing over Tor is recommended. IP edits are held for moderation.

Unless otherwise noted above, content of this  page is copyrighted by [mailto:adrelanos@riseupDOTnet adrelanos] and licensed under the same Free (as in speech) license as Whonix itself.

Questions? [[Contact | Contact us!]]

[[Donate|Donate to Whonix!]]&lt;/font&gt;</text>
      <sha1>qp9t2yag5bepkk9rd7tdwkv4m3b9060</sha1>
    </revision>
    <revision>
      <id>2280</id>
      <parentid>2279</parentid>
      <timestamp>2013-08-10T20:09:53Z</timestamp>
      <contributor>
        <username>Anon</username>
        <id>10</id>
      </contributor>
      <origin>2280</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="532" sha1="p8eeu3scr2hm4wp7uhmoqufqdmi5ck3" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;

&lt;font size="-3"&gt;This is a wiki. Want to improve this page? &lt;html&gt;&lt;a href="&lt;/html&gt;{{localurl:{{FULLPAGENAME}}|action=edit}}&lt;html&gt;"&gt;Edit&lt;/a&gt;&lt;/html&gt; it! IP addresses are scrubbed, but editing over Tor is recommended. IP edits are held for moderation.

Unless otherwise noted above, content of this  page is copyrighted by [mailto:adrelanos@riseupDOTnet adrelanos] and licensed under the same Free (as in speech) license as Whonix itself.

Questions? [[Contact | Contact us!]]

[[Contribute#Donate|Donate to Whonix!]]&lt;/font&gt;</text>
      <sha1>p8eeu3scr2hm4wp7uhmoqufqdmi5ck3</sha1>
    </revision>
    <revision>
      <id>4553</id>
      <parentid>2280</parentid>
      <timestamp>2013-12-31T09:34:29Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>4553</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="529" sha1="e5dt149zj0o4bltvjwtsw7tnsbel7oc" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;

&lt;font size="-3"&gt;This is a wiki. Want to improve this page? &lt;html&gt;&lt;a href="&lt;/html&gt;{{localurl:{{FULLPAGENAME}}|action=edit}}&lt;html&gt;"&gt;Edit&lt;/a&gt;&lt;/html&gt; it! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Unless otherwise noted above, content of this  page is copyrighted by [mailto:adrelanos@riseupDOTnet adrelanos] and licensed under the same Free (as in speech) license as Whonix itself.

Questions? [[Contact | Contact us!]]

[[Contribute#Donate|Donate to Whonix!]]&lt;/font&gt;</text>
      <sha1>e5dt149zj0o4bltvjwtsw7tnsbel7oc</sha1>
    </revision>
    <revision>
      <id>4554</id>
      <parentid>4553</parentid>
      <timestamp>2013-12-31T09:47:31Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>4554</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="863" sha1="5rvf5rhjat6u69sxs53h7hwckdpgsdg" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;

&lt;font size="-3"&gt;This is a wiki. Want to improve this page? See [https://github.com/Whonix/Whonix/blob/master/debian/copyright Conditions for Contributions to Whonix], then &lt;html&gt;&lt;a href="&lt;/html&gt;{{localurl:{{FULLPAGENAME}}|action=edit}}&lt;html&gt;"&gt;Edit&lt;/a&gt;&lt;/html&gt; it! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix is a [http://www.openinventionnetwork.com/licensees.php licensee] of the [https://en.wikipedia.org/wiki/Open_Invention_Network Open Invention Network]. Unless otherwise noted above, content of this  page is copyrighted by [mailto:adrelanos@riseupDOTnet adrelanos] and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.

Questions? [[Contact|Contact us!]]

[[Contribute#Donate|Donate to Whonix!]]&lt;/font&gt;</text>
      <sha1>5rvf5rhjat6u69sxs53h7hwckdpgsdg</sha1>
    </revision>
    <revision>
      <id>4763</id>
      <parentid>4554</parentid>
      <timestamp>2014-01-14T17:43:45Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>4763</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="869" sha1="khny3c1m11ssk5ma8ikjndvnryb0b27" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;

&lt;font size="-3"&gt;This is a wiki. Want to improve this page? See [https://github.com/Whonix/Whonix/blob/master/debian/copyright Conditions for Contributions to Whonix], then &lt;html&gt;&lt;a href="&lt;/html&gt;{{localurl:{{FULLPAGENAME}}|action=edit}}&lt;html&gt;"&gt;Edit&lt;/a&gt;&lt;/html&gt; it! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix is a [http://www.openinventionnetwork.com/licensees.php licensee] of the [https://en.wikipedia.org/wiki/Open_Invention_Network Open Invention Network]. Unless otherwise noted above, content of this  page is copyrighted by [mailto:adrelanos@riseup.net Patrick Schleizer] and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.

Questions? [[Contact|Contact us!]]

[[Contribute#Donate|Donate to Whonix!]]&lt;/font&gt;</text>
      <sha1>khny3c1m11ssk5ma8ikjndvnryb0b27</sha1>
    </revision>
    <revision>
      <id>6093</id>
      <parentid>4763</parentid>
      <timestamp>2014-02-28T00:15:01Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>6093</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="910" sha1="ndh4mjh2ysd3cxb1fwcoswdl4wwndx6" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;

&lt;font size="-3"&gt;This is a wiki. Want to improve this page? See [https://github.com/Whonix/Whonix/blob/master/debian/copyright Conditions for Contributions to Whonix], then &lt;html&gt;&lt;a href="&lt;/html&gt;{{localurl:{{FULLPAGENAME}}|action=edit}}&lt;html&gt;"&gt;Edit&lt;/a&gt;&lt;/html&gt; it! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix is a [http://www.openinventionnetwork.com/licensees.php licensee] of the [[File:OIN_logo_200px.png|link=https://en.wikipedia.org/wiki/Open_Invention_Network|alt=Open Invention Network|140px]]. Unless otherwise noted above, content of this  page is copyrighted by [mailto:adrelanos@riseup.net Patrick Schleizer] and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.

Questions? [[Contact|Contact us!]]

[[Contribute#Donate|Donate to Whonix!]]&lt;/font&gt;</text>
      <sha1>ndh4mjh2ysd3cxb1fwcoswdl4wwndx6</sha1>
    </revision>
    <revision>
      <id>6851</id>
      <parentid>6093</parentid>
      <timestamp>2014-03-11T23:03:51Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>6851</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1456" sha1="qmglvqcoeug881tn5hw463tf2vj0na8" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;&lt;font size="-3"&gt;[[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutzerklärung]] | [[Disclaimer|Haftungsausschluss]]
[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" style="color: #3366BB" href="http://kkkkkkkkkk63ava6.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt; &lt;sup&gt;[[Forcing .onion on Whonix.org|note]]&lt;/sup&gt; | [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | [https://kkkkkkkkkk63ava6.tor2web.org{{localurl:{{FULLPAGENAME}}}} Mirror]
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;

This is a wiki. Want to improve this page? See [https://github.com/Whonix/Whonix/blob/master/debian/copyright Conditions for Contributions to Whonix], then &lt;html&gt;&lt;a href="&lt;/html&gt;{{localurl:{{FULLPAGENAME}}|action=edit}}&lt;html&gt;"&gt;Edit&lt;/a&gt;&lt;/html&gt; it! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix is a [http://www.openinventionnetwork.com/licensees.php licensee] of the [[File:OIN_logo_200px.png|link=https://en.wikipedia.org/wiki/Open_Invention_Network|alt=Open Invention Network|140px]]. Unless otherwise noted above, content of this  page is copyrighted by [mailto:adrelanos@riseup.net Patrick Schleizer] and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.
&lt;/font&gt;</text>
      <sha1>qmglvqcoeug881tn5hw463tf2vj0na8</sha1>
    </revision>
    <revision>
      <id>6857</id>
      <parentid>6851</parentid>
      <timestamp>2014-03-12T00:11:24Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>6857</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1691" sha1="slg3oqumckt2f7cs1569pzomly9ttty" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;&lt;font size="-3"&gt;[[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutzerklärung]] | [[Disclaimer|Haftungsausschluss]]
[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" style="color: #3366BB" href="http://kkkkkkkkkk63ava6.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt; &lt;sup&gt;[[Forcing .onion on Whonix.org|note]]&lt;/sup&gt; | [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | [https://kkkkkkkkkk63ava6.tor2web.org{{localurl:{{FULLPAGENAME}}}} Mirror]
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;

This is a wiki. Want to improve this page? See [https://github.com/Whonix/Whonix/blob/master/debian/copyright Conditions for Contributions to Whonix], then &lt;html&gt;&lt;a href="&lt;/html&gt;{{localurl:{{FULLPAGENAME}}|action=edit}}&lt;html&gt;"&gt;Edit&lt;/a&gt;&lt;/html&gt; it! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix (&lt;html&gt;&lt;a href="https://plus.google.com/108150429836421683225" rel="publisher" /&gt;g+&lt;/a&gt;&lt;/html&gt;) is a [http://www.openinventionnetwork.com/licensees.php licensee] of the [[File:OIN_logo_200px.png|link=https://en.wikipedia.org/wiki/Open_Invention_Network|alt=Open Invention Network|140px]]. Unless otherwise noted above, content of this  page is copyrighted by [mailto:adrelanos@riseup.net Patrick Schleizer] (&lt;html&gt;&lt;a href="/patrick.asc"&gt;gpg&lt;/a&gt;&lt;/html&gt;) (&lt;html&gt;&lt;a href="https://plus.google.com/u/0/112678569435063398972?rel=author"&gt;g+&lt;/a&gt;)&lt;/html&gt; and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.
&lt;/font&gt;</text>
      <sha1>slg3oqumckt2f7cs1569pzomly9ttty</sha1>
    </revision>
    <revision>
      <id>6862</id>
      <parentid>6857</parentid>
      <timestamp>2014-03-12T02:51:45Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>6862</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1785" sha1="ajohkwwdnary4xlj8rykc6h1xbavzuk" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;&lt;font size="-3"&gt;&lt;html&gt;&lt;a href="/w/index.php?title=Special:UserLogin&amp;returnto=Main+Page" /&gt;Log in&lt;/a&gt;&lt;/html&gt; | [[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutzerklärung]] | [[Disclaimer|Haftungsausschluss]]
[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" style="color: #3366BB" href="http://kkkkkkkkkk63ava6.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt; &lt;sup&gt;[[Forcing .onion on Whonix.org|note]]&lt;/sup&gt; | [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | [https://kkkkkkkkkk63ava6.tor2web.org{{localurl:{{FULLPAGENAME}}}} Mirror]
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;

This is a wiki. Want to improve this page? See [https://github.com/Whonix/Whonix/blob/master/debian/copyright Conditions for Contributions to Whonix], then &lt;html&gt;&lt;a href="&lt;/html&gt;{{localurl:{{FULLPAGENAME}}|action=edit}}&lt;html&gt;"&gt;Edit&lt;/a&gt;&lt;/html&gt; it! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix (&lt;html&gt;&lt;a href="https://plus.google.com/108150429836421683225" rel="publisher" /&gt;g+&lt;/a&gt;&lt;/html&gt;) is a [http://www.openinventionnetwork.com/licensees.php licensee] of the [[File:OIN_logo_200px.png|link=https://en.wikipedia.org/wiki/Open_Invention_Network|alt=Open Invention Network|140px]]. Unless otherwise noted above, content of this  page is copyrighted by [mailto:adrelanos@riseup.net Patrick Schleizer] (&lt;html&gt;&lt;a href="/patrick.asc"&gt;gpg&lt;/a&gt;&lt;/html&gt;) (&lt;html&gt;&lt;a href="https://plus.google.com/u/0/112678569435063398972?rel=author"&gt;g+&lt;/a&gt;)&lt;/html&gt; and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.
&lt;/font&gt;</text>
      <sha1>ajohkwwdnary4xlj8rykc6h1xbavzuk</sha1>
    </revision>
    <revision>
      <id>6867</id>
      <parentid>6862</parentid>
      <timestamp>2014-03-12T15:39:11Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>6867</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1755" sha1="dz142orzqqg10vd1zux2971kzwiawp7" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;&lt;font size="-3"&gt;[[Special:UserLogin|Log in]] | [[Special:OpenIDLogin|OpenID]] | [[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutzerklärung]] | [[Disclaimer|Haftungsausschluss]]
[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" style="color: #3366BB" href="http://kkkkkkkkkk63ava6.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt; &lt;sup&gt;[[Forcing .onion on Whonix.org|note]]&lt;/sup&gt; | [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | [https://kkkkkkkkkk63ava6.tor2web.org{{localurl:{{FULLPAGENAME}}}} Mirror]
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;

This is a wiki. Want to improve this page? See [https://github.com/Whonix/Whonix/blob/master/debian/copyright Conditions for Contributions to Whonix], then &lt;html&gt;&lt;a href="&lt;/html&gt;{{localurl:{{FULLPAGENAME}}|action=edit}}&lt;html&gt;"&gt;Edit&lt;/a&gt;&lt;/html&gt; it! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix (&lt;html&gt;&lt;a href="https://plus.google.com/108150429836421683225" rel="publisher" /&gt;g+&lt;/a&gt;&lt;/html&gt;) is a [http://www.openinventionnetwork.com/licensees.php licensee] of the [[File:OIN_logo_200px.png|link=https://en.wikipedia.org/wiki/Open_Invention_Network|alt=Open Invention Network|140px]]. Unless otherwise noted above, content of this  page is copyrighted by [mailto:adrelanos@riseup.net Patrick Schleizer] (&lt;html&gt;&lt;a href="/patrick.asc"&gt;gpg&lt;/a&gt;&lt;/html&gt;) (&lt;html&gt;&lt;a href="https://plus.google.com/u/0/112678569435063398972?rel=author"&gt;g+&lt;/a&gt;)&lt;/html&gt; and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.
&lt;/font&gt;</text>
      <sha1>dz142orzqqg10vd1zux2971kzwiawp7</sha1>
    </revision>
    <revision>
      <id>6919</id>
      <parentid>6867</parentid>
      <timestamp>2014-03-15T07:47:13Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <origin>6919</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1732" sha1="maknfpz2b32mkmhzj5cobob2ab5h0ug" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;&lt;font size="-3"&gt;[[Special:UserLogin|Log in]] | [[Special:OpenIDLogin|OpenID]] | [[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutzerklärung]] | [[Disclaimer|Haftungsausschluss]]
[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" href="http://kkkkkkkkkk63ava6.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt; &lt;sup&gt;[[Forcing .onion on Whonix.org|note]]&lt;/sup&gt; | [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | [https://kkkkkkkkkk63ava6.tor2web.org{{localurl:{{FULLPAGENAME}}}} Mirror]
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;

This is a wiki. Want to improve this page? See [https://github.com/Whonix/Whonix/blob/master/debian/copyright Conditions for Contributions to Whonix], then &lt;html&gt;&lt;a href="&lt;/html&gt;{{localurl:{{FULLPAGENAME}}|action=edit}}&lt;html&gt;"&gt;Edit&lt;/a&gt;&lt;/html&gt; it! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix (&lt;html&gt;&lt;a href="https://plus.google.com/108150429836421683225" rel="publisher" /&gt;g+&lt;/a&gt;&lt;/html&gt;) is a [http://www.openinventionnetwork.com/licensees.php licensee] of the [[File:OIN_logo_200px.png|link=https://en.wikipedia.org/wiki/Open_Invention_Network|alt=Open Invention Network|140px]]. Unless otherwise noted above, content of this  page is copyrighted by [mailto:adrelanos@riseup.net Patrick Schleizer] (&lt;html&gt;&lt;a href="/patrick.asc"&gt;gpg&lt;/a&gt;&lt;/html&gt;) (&lt;html&gt;&lt;a href="https://plus.google.com/u/0/112678569435063398972?rel=author"&gt;g+&lt;/a&gt;)&lt;/html&gt; and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.
&lt;/font&gt;</text>
      <sha1>maknfpz2b32mkmhzj5cobob2ab5h0ug</sha1>
    </revision>
    <revision>
      <id>6921</id>
      <parentid>6919</parentid>
      <timestamp>2014-03-15T08:06:10Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <origin>6921</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1734" sha1="l7v70cbetzpxigwyrlbm0bjd4f4sao4" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;&lt;font size="-3"&gt;[[Special:UserLogin|Log in]] | [[Special:OpenIDLogin|OpenID]] | [[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutzerklärung]] | [[Disclaimer|Haftungsausschluss]]
[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" href="http://kkkkkkkkkk63ava6.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt; &lt;sup&gt;[[Forcing .onion on Whonix.org|[note]]]&lt;/sup&gt; | [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | [https://kkkkkkkkkk63ava6.tor2web.org{{localurl:{{FULLPAGENAME}}}} Mirror]
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;

This is a wiki. Want to improve this page? See [https://github.com/Whonix/Whonix/blob/master/debian/copyright Conditions for Contributions to Whonix], then &lt;html&gt;&lt;a href="&lt;/html&gt;{{localurl:{{FULLPAGENAME}}|action=edit}}&lt;html&gt;"&gt;Edit&lt;/a&gt;&lt;/html&gt; it! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix (&lt;html&gt;&lt;a href="https://plus.google.com/108150429836421683225" rel="publisher" /&gt;g+&lt;/a&gt;&lt;/html&gt;) is a [http://www.openinventionnetwork.com/licensees.php licensee] of the [[File:OIN_logo_200px.png|link=https://en.wikipedia.org/wiki/Open_Invention_Network|alt=Open Invention Network|140px]]. Unless otherwise noted above, content of this  page is copyrighted by [mailto:adrelanos@riseup.net Patrick Schleizer] (&lt;html&gt;&lt;a href="/patrick.asc"&gt;gpg&lt;/a&gt;&lt;/html&gt;) (&lt;html&gt;&lt;a href="https://plus.google.com/u/0/112678569435063398972?rel=author"&gt;g+&lt;/a&gt;)&lt;/html&gt; and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.
&lt;/font&gt;</text>
      <sha1>l7v70cbetzpxigwyrlbm0bjd4f4sao4</sha1>
    </revision>
    <revision>
      <id>7023</id>
      <parentid>6921</parentid>
      <timestamp>2014-03-23T13:01:26Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>7023</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1741" sha1="293zts07qvhnforzf391qptptdi5i9t" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;&lt;font size="-3"&gt;[[Special:UserLogin|Log in]] | [[Special:OpenIDLogin|OpenID]] | [[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutzerklärung]] | [[Disclaimer|Haftungsausschluss]]
[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" href="http://kkkkkkkkkk63ava6.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt; &lt;sup&gt;[[Forcing .onion on Whonix.org|[note]]]&lt;/sup&gt; | [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | [https://kkkkkkkkkk63ava6.tor2web.org{{localurl:{{FULLPAGENAME}}}} Mirror]
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;

This is a wiki. Want to improve this page? See [https://github.com/Whonix/Whonix/blob/master/debian/copyright Conditions for Contributions to Whonix], then &lt;html&gt;&lt;a href="&lt;/html&gt;{{localurl:{{FULLPAGENAME}}|action=edit}}&lt;html&gt;"&gt;Edit&lt;/a&gt;&lt;/html&gt; it! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix (&lt;html&gt;&lt;a href="https://plus.google.com/108150429836421683225" rel="publisher" /&gt;g+&lt;/a&gt;&lt;/html&gt;) is a [http://www.openinventionnetwork.com/licensees.php licensee] of the [[File:OIN_logo_200px.png|link=https://en.wikipedia.org/wiki/Open_Invention_Network|alt=Open Invention Network|140px]]. Unless otherwise noted above, content of this  page is copyrighted by [mailto:adrelanos@riseup.net Patrick Schleizer] (&lt;html&gt;&lt;a href="/patrick.asc"&gt;gpg&lt;/a&gt;&lt;/html&gt;) &lt;!--(&lt;html&gt;&lt;a href="https://plus.google.com/u/0/112678569435063398972?rel=author"&gt;g+&lt;/a&gt;)&lt;/html&gt;--&gt; and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.
&lt;/font&gt;</text>
      <sha1>293zts07qvhnforzf391qptptdi5i9t</sha1>
    </revision>
    <revision>
      <id>7304</id>
      <parentid>7023</parentid>
      <timestamp>2014-04-05T04:58:34Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>7304</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1731" sha1="35e1h6wgb570se2br0i7b3fz7fbzb83" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;&lt;font size="-3"&gt;[[Special:UserLogin|Log in]] | [[Special:OpenIDLogin|OpenID]] | [[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutz]] | [[Disclaimer|Haftungsausschluss]]
[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" href="http://kkkkkkkkkk63ava6.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt; &lt;sup&gt;[[Forcing .onion on Whonix.org|[note]]]&lt;/sup&gt; | [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | [https://kkkkkkkkkk63ava6.tor2web.org{{localurl:{{FULLPAGENAME}}}} Mirror]
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;

This is a wiki. Want to improve this page? See [https://github.com/Whonix/Whonix/blob/master/debian/copyright Conditions for Contributions to Whonix], then &lt;html&gt;&lt;a href="&lt;/html&gt;{{localurl:{{FULLPAGENAME}}|action=edit}}&lt;html&gt;"&gt;Edit&lt;/a&gt;&lt;/html&gt; it! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix (&lt;html&gt;&lt;a href="https://plus.google.com/108150429836421683225" rel="publisher" /&gt;g+&lt;/a&gt;&lt;/html&gt;) is a [http://www.openinventionnetwork.com/licensees.php licensee] of the [[File:OIN_logo_200px.png|link=https://en.wikipedia.org/wiki/Open_Invention_Network|alt=Open Invention Network|140px]]. Unless otherwise noted above, content of this  page is copyrighted by [mailto:adrelanos@riseup.net Patrick Schleizer] (&lt;html&gt;&lt;a href="/patrick.asc"&gt;gpg&lt;/a&gt;&lt;/html&gt;) &lt;!--(&lt;html&gt;&lt;a href="https://plus.google.com/u/0/112678569435063398972?rel=author"&gt;g+&lt;/a&gt;)&lt;/html&gt;--&gt; and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.
&lt;/font&gt;</text>
      <sha1>35e1h6wgb570se2br0i7b3fz7fbzb83</sha1>
    </revision>
    <revision>
      <id>7410</id>
      <parentid>7304</parentid>
      <timestamp>2014-04-08T03:17:45Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <origin>7410</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1731" sha1="es3c5jm9hv3x36pb2hg5ox3b4whwywq" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;&lt;font size="-3"&gt;[[Special:UserLogin|Log in]] | [[Special:OpenIDLogin|OpenID]] | [[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutz]] | [[Disclaimer|Haftungsausschluss]]
[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" href="http://xxxxxxxxxxh5kyrx.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt; &lt;sup&gt;[[Forcing .onion on Whonix.org|[note]]]&lt;/sup&gt; | [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | [https://kkkkkkkkkk63ava6.tor2web.org{{localurl:{{FULLPAGENAME}}}} Mirror]
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;

This is a wiki. Want to improve this page? See [https://github.com/Whonix/Whonix/blob/master/debian/copyright Conditions for Contributions to Whonix], then &lt;html&gt;&lt;a href="&lt;/html&gt;{{localurl:{{FULLPAGENAME}}|action=edit}}&lt;html&gt;"&gt;Edit&lt;/a&gt;&lt;/html&gt; it! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix (&lt;html&gt;&lt;a href="https://plus.google.com/108150429836421683225" rel="publisher" /&gt;g+&lt;/a&gt;&lt;/html&gt;) is a [http://www.openinventionnetwork.com/licensees.php licensee] of the [[File:OIN_logo_200px.png|link=https://en.wikipedia.org/wiki/Open_Invention_Network|alt=Open Invention Network|140px]]. Unless otherwise noted above, content of this  page is copyrighted by [mailto:adrelanos@riseup.net Patrick Schleizer] (&lt;html&gt;&lt;a href="/patrick.asc"&gt;gpg&lt;/a&gt;&lt;/html&gt;) &lt;!--(&lt;html&gt;&lt;a href="https://plus.google.com/u/0/112678569435063398972?rel=author"&gt;g+&lt;/a&gt;)&lt;/html&gt;--&gt; and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.
&lt;/font&gt;</text>
      <sha1>es3c5jm9hv3x36pb2hg5ox3b4whwywq</sha1>
    </revision>
    <revision>
      <id>7447</id>
      <parentid>7410</parentid>
      <timestamp>2014-04-10T04:21:54Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>7447</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1556" sha1="8hyw54torwwn56zao9znr7kn6loh2i3" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;&lt;font size="-3"&gt;[[Special:UserLogin|Log in]] | [[Special:OpenIDLogin|OpenID]] | [[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutz]] | [[Disclaimer|Haftungsausschluss]]
[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" href="http://xxxxxxxxxxh5kyrx.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt; &lt;sup&gt;[[Forcing .onion on Whonix.org|[note]]]&lt;/sup&gt; | [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | [https://kkkkkkkkkk63ava6.tor2web.org{{localurl:{{FULLPAGENAME}}}} Mirror]
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;

This is a wiki. Want to improve this page? See [https://github.com/Whonix/Whonix/blob/master/debian/copyright Conditions for Contributions to Whonix], then &lt;html&gt;&lt;a href="&lt;/html&gt;{{localurl:{{FULLPAGENAME}}|action=edit}}&lt;html&gt;"&gt;Edit&lt;/a&gt;&lt;/html&gt; it! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix (&lt;html&gt;&lt;a href="https://plus.google.com/108150429836421683225" rel="publisher" /&gt;g+&lt;/a&gt;&lt;/html&gt;) is a [http://www.openinventionnetwork.com/licensees.php licensee] of the [[File:OIN_logo_200px.png|link=https://en.wikipedia.org/wiki/Open_Invention_Network|alt=Open Invention Network|140px]]. Unless otherwise noted above, content of this  page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.
&lt;/font&gt;</text>
      <sha1>8hyw54torwwn56zao9znr7kn6loh2i3</sha1>
    </revision>
    <revision>
      <id>7512</id>
      <parentid>7447</parentid>
      <timestamp>2014-04-13T14:44:12Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>7512</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1557" sha1="sxq8lrihl6qbbjwfl6orkorh6w4u75v" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;&lt;font size="-3"&gt;[[Special:UserLogin|Log in]] | [[Special:OpenIDLogin|OpenID]] | [[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutz]] | [[Disclaimer|Haftungsausschluss]]
[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" href="http://xxxxxxxxxxh5kyrx.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt; &lt;sup&gt;[[Forcing .onion on Whonix.org|[note]]]&lt;/sup&gt; | [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | [https://kkkkkkkkkk63ava6.tor2web.org{{localurl:{{FULLPAGENAME}}}} Mirror]
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;

This is a wiki. Want to improve this page? See [https://github.com/Whonix/Whonix/blob/master/debian/copyright Conditions for Contributions to Whonix], then &lt;html&gt;&lt;a href="&lt;/html&gt;{{localurl:{{FULLPAGENAME}}|action=edit}}&lt;html&gt;"&gt;Edit&lt;/a&gt;&lt;/html&gt; it! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix (&lt;html&gt;&lt;a href="https://plus.google.com/108150429836421683225" rel="publisher" /&gt;g+&lt;/a&gt;&lt;/html&gt;) is a [http://www.openinventionnetwork.com/licensees.php licensee] of the [[File:OIN_logo_200px.jpeg|link=https://en.wikipedia.org/wiki/Open_Invention_Network|alt=Open Invention Network|140px]]. Unless otherwise noted above, content of this  page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.
&lt;/font&gt;</text>
      <sha1>sxq8lrihl6qbbjwfl6orkorh6w4u75v</sha1>
    </revision>
    <revision>
      <id>7523</id>
      <parentid>7512</parentid>
      <timestamp>2014-04-13T16:21:11Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>7523</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1460" sha1="jd88v6a118471vi7m7q65cuzy1qsu5d" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;&lt;font size="-3"&gt;[[Special:UserLogin|Log in]] | [[Special:OpenIDLogin|OpenID]] | [[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutz]] | [[Disclaimer|Haftungsausschluss]]
[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" href="http://xxxxxxxxxxh5kyrx.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt; &lt;sup&gt;[[Forcing .onion on Whonix.org|[note]]]&lt;/sup&gt; | [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | [https://kkkkkkkkkk63ava6.tor2web.org{{localurl:{{FULLPAGENAME}}}} Mirror]
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;

This is a wiki. Want to improve this page? See [https://github.com/Whonix/Whonix/blob/master/debian/copyright Conditions for Contributions to Whonix], then &lt;html&gt;&lt;a href="&lt;/html&gt;{{localurl:{{FULLPAGENAME}}|action=edit}}&lt;html&gt;"&gt;Edit&lt;/a&gt;&lt;/html&gt; it! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix (&lt;html&gt;&lt;a href="https://plus.google.com/108150429836421683225" rel="publisher" /&gt;g+&lt;/a&gt;&lt;/html&gt;) is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted above, content of this  page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.
&lt;/font&gt;</text>
      <sha1>jd88v6a118471vi7m7q65cuzy1qsu5d</sha1>
    </revision>
    <revision>
      <id>7704</id>
      <parentid>7523</parentid>
      <timestamp>2014-05-07T12:58:12Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>7704</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1489" sha1="1mjiw3u3iwcku4gnhvfsndk2iobnt9d" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;&lt;font size="-3"&gt;[[Special:UserLogin|Log in]] | [[Special:OpenIDLogin|OpenID]] | [[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutz]] | [[Disclaimer|Haftungsausschluss]] | [[Investors]] | [[Donate]]
[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" href="http://xxxxxxxxxxh5kyrx.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt; &lt;sup&gt;[[Forcing .onion on Whonix.org|[note]]]&lt;/sup&gt; | [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | [https://kkkkkkkkkk63ava6.tor2web.org{{localurl:{{FULLPAGENAME}}}} Mirror]
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;

This is a wiki. Want to improve this page? See [https://github.com/Whonix/Whonix/blob/master/debian/copyright Conditions for Contributions to Whonix], then &lt;html&gt;&lt;a href="&lt;/html&gt;{{localurl:{{FULLPAGENAME}}|action=edit}}&lt;html&gt;"&gt;Edit&lt;/a&gt;&lt;/html&gt; it! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix (&lt;html&gt;&lt;a href="https://plus.google.com/108150429836421683225" rel="publisher" /&gt;g+&lt;/a&gt;&lt;/html&gt;) is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted above, content of this  page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.
&lt;/font&gt;</text>
      <sha1>1mjiw3u3iwcku4gnhvfsndk2iobnt9d</sha1>
    </revision>
    <revision>
      <id>7946</id>
      <parentid>7704</parentid>
      <timestamp>2014-05-28T07:20:53Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>7946</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1901" sha1="t5310u75ok84eeg2sli5eauqmj2lyla" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;&lt;font size="-3"&gt;[[Special:UserLogin|Log in]] | [[Special:OpenIDLogin|OpenID]] | [[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutz]] | [[Disclaimer|Haftungsausschluss]] | [[Investors]] | [[Donate]]
[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" href="http://xxxxxxxxxxh5kyrx.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt; &lt;sup&gt;[[Forcing .onion on Whonix.org|[note]]]&lt;/sup&gt; | [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | [https://kkkkkkkkkk63ava6.tor2web.org{{localurl:{{FULLPAGENAME}}}} Mirror] | Share: &lt;html&gt;
&lt;a href="https://twitter.com/intent/tweet?url=https://www.whonix.org&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;&amp;text=&amp;via=Whonix"&gt;Twitter&lt;/a&gt; |
&lt;a href="https://facebook.com/sharer.php?u=https://www.whonix.org&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;"&gt;Facebook&lt;/a&gt; |
&lt;a href="https://plus.google.com/share?url=https://www.whonix.org&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;"&gt;Google+&lt;/a&gt;
&lt;/html&gt;
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;

This is a wiki. Want to improve this page? See [https://github.com/Whonix/Whonix/blob/master/debian/copyright Conditions for Contributions to Whonix], then &lt;html&gt;&lt;a href="&lt;/html&gt;{{localurl:{{FULLPAGENAME}}|action=edit}}&lt;html&gt;"&gt;Edit&lt;/a&gt;&lt;/html&gt; it! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix (&lt;html&gt;&lt;a href="https://plus.google.com/108150429836421683225" rel="publisher" /&gt;g+&lt;/a&gt;&lt;/html&gt;) is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted above, content of this  page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.
&lt;/font&gt;</text>
      <sha1>t5310u75ok84eeg2sli5eauqmj2lyla</sha1>
    </revision>
    <revision>
      <id>7948</id>
      <parentid>7946</parentid>
      <timestamp>2014-05-28T07:22:30Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>7948</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1508" sha1="ck7y6um6ydi7kf0k8799wcg7h32h4so" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;&lt;font size="-3"&gt;[[Special:UserLogin|Log in]] | [[Special:OpenIDLogin|OpenID]] | [[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutz]] | [[Disclaimer|Haftungsausschluss]] | [[Investors]] | [[Donate]]
[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" href="http://xxxxxxxxxxh5kyrx.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt; &lt;sup&gt;[[Forcing .onion on Whonix.org|[note]]]&lt;/sup&gt; | [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | [https://kkkkkkkkkk63ava6.tor2web.org{{localurl:{{FULLPAGENAME}}}} Mirror] | Share: {{Share}}
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;

This is a wiki. Want to improve this page? See [https://github.com/Whonix/Whonix/blob/master/debian/copyright Conditions for Contributions to Whonix], then &lt;html&gt;&lt;a href="&lt;/html&gt;{{localurl:{{FULLPAGENAME}}|action=edit}}&lt;html&gt;"&gt;Edit&lt;/a&gt;&lt;/html&gt; it! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix (&lt;html&gt;&lt;a href="https://plus.google.com/108150429836421683225" rel="publisher" /&gt;g+&lt;/a&gt;&lt;/html&gt;) is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted above, content of this  page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.
&lt;/font&gt;</text>
      <sha1>ck7y6um6ydi7kf0k8799wcg7h32h4so</sha1>
    </revision>
    <revision>
      <id>8062</id>
      <parentid>7948</parentid>
      <timestamp>2014-06-12T21:26:42Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <origin>8062</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1508" sha1="1cfglt9iayhgi4gbpx34ng43l4wxrmm" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;&lt;font size="-3"&gt;[[Special:UserLogin|Log in]] | [[Special:OpenIDLogin|OpenID]] | [[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutz]] | [[Disclaimer|Haftungsausschluss]] | [[Investors]] | [[Donate]]
[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a class="link-https" href="http://xxxxxxxxxxh5kyrx.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt; &lt;sup&gt;[[Forcing .onion on Whonix.org|[note]]]&lt;/sup&gt; | [http://whonix.org.nyud.net{{localurl:{{FULLPAGENAME}}}} Mirror] | [https://xxxxxxxxxxh5kyrx.tor2web.org{{localurl:{{FULLPAGENAME}}}} Mirror] | Share: {{Share}}
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;

This is a wiki. Want to improve this page? See [https://github.com/Whonix/Whonix/blob/master/debian/copyright Conditions for Contributions to Whonix], then &lt;html&gt;&lt;a href="&lt;/html&gt;{{localurl:{{FULLPAGENAME}}|action=edit}}&lt;html&gt;"&gt;Edit&lt;/a&gt;&lt;/html&gt; it! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix (&lt;html&gt;&lt;a href="https://plus.google.com/108150429836421683225" rel="publisher" /&gt;g+&lt;/a&gt;&lt;/html&gt;) is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted above, content of this  page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.
&lt;/font&gt;</text>
      <sha1>1cfglt9iayhgi4gbpx34ng43l4wxrmm</sha1>
    </revision>
    <revision>
      <id>8135</id>
      <parentid>8062</parentid>
      <timestamp>2014-07-01T14:17:33Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>8135</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1595" sha1="fsvba4ni2ovrbq5ob4mqi49erhgk6p8" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;&lt;font size="-3"&gt;[[Special:UserLogin|Log in]] | [[Special:OpenIDLogin|OpenID]] | [[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutz]] | [[Disclaimer|Haftungsausschluss]] | [[Investors]] | [[Donate]]
[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a href="http://xxxxxxxxxxh5kyrx.onion&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;.onion&lt;/a&gt;&lt;/html&gt; &lt;sup&gt;[[Forcing .onion on Whonix.org|[note]]]&lt;/sup&gt; | &lt;html&gt;&lt;a href="http://whonix.org.nyud.net&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;Mirror&lt;/a&gt;&lt;/html&gt; | &lt;html&gt;&lt;a href="https://xxxxxxxxxxh5kyrx.tor2web.org&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;Mirror&lt;/a&gt;&lt;/html&gt; | Share: {{Share}}
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;

This is a wiki. Want to improve this page? See [https://github.com/Whonix/Whonix/blob/master/debian/copyright Conditions for Contributions to Whonix], then &lt;html&gt;&lt;a href="&lt;/html&gt;{{localurl:{{FULLPAGENAME}}|action=edit}}&lt;html&gt;"&gt;Edit&lt;/a&gt;&lt;/html&gt; it! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix (&lt;html&gt;&lt;a href="https://plus.google.com/108150429836421683225" rel="publisher" /&gt;g+&lt;/a&gt;&lt;/html&gt;) is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted above, content of this  page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.
&lt;/font&gt;</text>
      <sha1>fsvba4ni2ovrbq5ob4mqi49erhgk6p8</sha1>
    </revision>
    <revision>
      <id>12007</id>
      <parentid>8135</parentid>
      <timestamp>2014-11-09T23:17:54Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>12007</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1421" sha1="r5wx77nbdm928r506ey593062ptlf8i" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;&lt;font size="-3"&gt;[[Special:UserLogin|Log in]] | [[Special:OpenIDLogin|OpenID]] | [[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutz]] | [[Disclaimer|Haftungsausschluss]] | [[Investors]] | [[Donate]]
[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a href="http://whonix.org.nyud.net&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;Mirror&lt;/a&gt;&lt;/html&gt; | &lt;html&gt;&lt;a href="https://xxxxxxxxxxh5kyrx.tor2web.org&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;Mirror&lt;/a&gt;&lt;/html&gt; | Share: {{Share}}
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;

This is a wiki. Want to improve this page? See [https://github.com/Whonix/Whonix/blob/master/debian/copyright Conditions for Contributions to Whonix], then &lt;html&gt;&lt;a href="&lt;/html&gt;{{localurl:{{FULLPAGENAME}}|action=edit}}&lt;html&gt;"&gt;Edit&lt;/a&gt;&lt;/html&gt; it! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix (&lt;html&gt;&lt;a href="https://plus.google.com/108150429836421683225" rel="publisher" /&gt;g+&lt;/a&gt;&lt;/html&gt;) is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted above, content of this  page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.
&lt;/font&gt;</text>
      <sha1>r5wx77nbdm928r506ey593062ptlf8i</sha1>
    </revision>
    <revision>
      <id>14684</id>
      <parentid>12007</parentid>
      <timestamp>2015-01-27T22:48:57Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>Replaced content with "{{#widget:Footer}}"</comment>
      <origin>14684</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="18" sha1="91vg5ewfnb6ir62netnuolq8pjc67mv" xml:space="preserve">{{#widget:Footer}}</text>
      <sha1>91vg5ewfnb6ir62netnuolq8pjc67mv</sha1>
    </revision>
    <revision>
      <id>14685</id>
      <parentid>14684</parentid>
      <timestamp>2015-01-27T22:50:19Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>Undo revision 14684 by [[Special:Contributions/Patrick|Patrick]] ([[User talk:Patrick|talk]])</comment>
      <origin>14685</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1421" sha1="r5wx77nbdm928r506ey593062ptlf8i" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;&lt;font size="-3"&gt;[[Special:UserLogin|Log in]] | [[Special:OpenIDLogin|OpenID]] | [[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutz]] | [[Disclaimer|Haftungsausschluss]] | [[Investors]] | [[Donate]]
[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a href="http://whonix.org.nyud.net&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;Mirror&lt;/a&gt;&lt;/html&gt; | &lt;html&gt;&lt;a href="https://xxxxxxxxxxh5kyrx.tor2web.org&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;Mirror&lt;/a&gt;&lt;/html&gt; | Share: {{Share}}
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;

This is a wiki. Want to improve this page? See [https://github.com/Whonix/Whonix/blob/master/debian/copyright Conditions for Contributions to Whonix], then &lt;html&gt;&lt;a href="&lt;/html&gt;{{localurl:{{FULLPAGENAME}}|action=edit}}&lt;html&gt;"&gt;Edit&lt;/a&gt;&lt;/html&gt; it! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix (&lt;html&gt;&lt;a href="https://plus.google.com/108150429836421683225" rel="publisher" /&gt;g+&lt;/a&gt;&lt;/html&gt;) is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted above, content of this  page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.
&lt;/font&gt;</text>
      <sha1>r5wx77nbdm928r506ey593062ptlf8i</sha1>
    </revision>
    <revision>
      <id>14687</id>
      <parentid>14685</parentid>
      <timestamp>2015-01-27T22:52:22Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>14687</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1429" sha1="9aj4hxobonw0atrb4yw8nrb7l7dr4ga" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;&lt;font size="-3"&gt;[[Special:UserLogin|Log in]] | [[Special:OpenIDLogin|OpenID]] | [[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutz]] | [[Disclaimer|Haftungsausschluss]] | [[Investors]] | [[Donate]]
[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | &lt;html&gt;&lt;a href="http://whonix.org.nyud.net&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;Mirror&lt;/a&gt;&lt;/html&gt; | &lt;html&gt;&lt;a href="https://xxxxxxxxxxh5kyrx.tor2web.org&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;Mirror&lt;/a&gt;&lt;/html&gt; | Share: {{#widget:Share}}
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;

This is a wiki. Want to improve this page? See [https://github.com/Whonix/Whonix/blob/master/debian/copyright Conditions for Contributions to Whonix], then &lt;html&gt;&lt;a href="&lt;/html&gt;{{localurl:{{FULLPAGENAME}}|action=edit}}&lt;html&gt;"&gt;Edit&lt;/a&gt;&lt;/html&gt; it! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix (&lt;html&gt;&lt;a href="https://plus.google.com/108150429836421683225" rel="publisher" /&gt;g+&lt;/a&gt;&lt;/html&gt;) is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted above, content of this  page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.
&lt;/font&gt;</text>
      <sha1>9aj4hxobonw0atrb4yw8nrb7l7dr4ga</sha1>
    </revision>
    <revision>
      <id>14700</id>
      <parentid>14687</parentid>
      <timestamp>2015-01-28T19:33:40Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>14700</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1331" sha1="azo1y6dvt6m1ixaoa6qkbkzy4cnw2fh" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;&lt;font size="-3"&gt;[[Special:UserLogin|Log in]] | [[Special:OpenIDLogin|OpenID]] | [[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutz]] | [[Disclaimer|Haftungsausschluss]] | [[Investors]] | [[Donate]]
[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | {{Mirror_nyud_net}} | &lt;html&gt;&lt;a href="https://xxxxxxxxxxh5kyrx.tor2web.org&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;Mirror&lt;/a&gt;&lt;/html&gt; | Share: {{#widget:Share}}
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;

This is a wiki. Want to improve this page? See [https://github.com/Whonix/Whonix/blob/master/debian/copyright Conditions for Contributions to Whonix], then &lt;html&gt;&lt;a href="&lt;/html&gt;{{localurl:{{FULLPAGENAME}}|action=edit}}&lt;html&gt;"&gt;Edit&lt;/a&gt;&lt;/html&gt; it! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix (&lt;html&gt;&lt;a href="https://plus.google.com/108150429836421683225" rel="publisher" /&gt;g+&lt;/a&gt;&lt;/html&gt;) is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted above, content of this  page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.
&lt;/font&gt;</text>
      <sha1>azo1y6dvt6m1ixaoa6qkbkzy4cnw2fh</sha1>
    </revision>
    <revision>
      <id>14702</id>
      <parentid>14700</parentid>
      <timestamp>2015-01-28T20:08:53Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>14702</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1323" sha1="cd3bvqojw1gttv3hbz41taurtnnz71m" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;&lt;font size="-3"&gt;[[Special:UserLogin|Log in]] | [[Special:OpenIDLogin|OpenID]] | [[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutz]] | [[Disclaimer|Haftungsausschluss]] | [[Investors]] | [[Donate]]
[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | {{Mirror_nyud_net}} | &lt;html&gt;&lt;a href="https://xxxxxxxxxxh5kyrx.tor2web.org&lt;/html&gt;{{localurl:{{FULLPAGENAME}}}}&lt;html&gt;" rel="nofollow"&gt;Mirror&lt;/a&gt;&lt;/html&gt; | Share: {{Share}}
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;

This is a wiki. Want to improve this page? See [https://github.com/Whonix/Whonix/blob/master/debian/copyright Conditions for Contributions to Whonix], then &lt;html&gt;&lt;a href="&lt;/html&gt;{{localurl:{{FULLPAGENAME}}|action=edit}}&lt;html&gt;"&gt;Edit&lt;/a&gt;&lt;/html&gt; it! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix (&lt;html&gt;&lt;a href="https://plus.google.com/108150429836421683225" rel="publisher" /&gt;g+&lt;/a&gt;&lt;/html&gt;) is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted above, content of this  page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.
&lt;/font&gt;</text>
      <sha1>cd3bvqojw1gttv3hbz41taurtnnz71m</sha1>
    </revision>
    <revision>
      <id>14716</id>
      <parentid>14702</parentid>
      <timestamp>2015-01-28T20:26:17Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>14716</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1218" sha1="rc1r4tul34op8dpipwpqlxsfkp3u49g" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;&lt;font size="-3"&gt;[[Special:UserLogin|Log in]] | [[Special:OpenIDLogin|OpenID]] | [[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutz]] | [[Disclaimer|Haftungsausschluss]] | [[Investors]] | [[Donate]]
[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | {{Mirror_nyud_net}} | {{Mirror_tor2web_org}} | Share: {{Share}}
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;

This is a wiki. Want to improve this page? See [https://github.com/Whonix/Whonix/blob/master/debian/copyright Conditions for Contributions to Whonix], then &lt;html&gt;&lt;a href="&lt;/html&gt;{{localurl:{{FULLPAGENAME}}|action=edit}}&lt;html&gt;"&gt;Edit&lt;/a&gt;&lt;/html&gt; it! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix (&lt;html&gt;&lt;a href="https://plus.google.com/108150429836421683225" rel="publisher" /&gt;g+&lt;/a&gt;&lt;/html&gt;) is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted above, content of this  page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.
&lt;/font&gt;</text>
      <sha1>rc1r4tul34op8dpipwpqlxsfkp3u49g</sha1>
    </revision>
    <revision>
      <id>14722</id>
      <parentid>14716</parentid>
      <timestamp>2015-01-28T20:34:37Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>14722</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1140" sha1="qbpn6bu7wliq8ah7axibj8e0tsog0ml" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;&lt;font size="-3"&gt;[[Special:UserLogin|Log in]] | [[Special:OpenIDLogin|OpenID]] | [[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutz]] | [[Disclaimer|Haftungsausschluss]] | [[Investors]] | [[Donate]]
[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | {{Mirror_nyud_net}} | {{Mirror_tor2web_org}} | Share: {{Share}}
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;

This is a wiki. Want to improve this page? See [https://github.com/Whonix/Whonix/blob/master/debian/copyright Conditions for Contributions to Whonix], then {{Edit_it}}! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix (&lt;html&gt;&lt;a href="https://plus.google.com/108150429836421683225" rel="publisher" /&gt;g+&lt;/a&gt;&lt;/html&gt;) is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted above, content of this  page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.
&lt;/font&gt;</text>
      <sha1>qbpn6bu7wliq8ah7axibj8e0tsog0ml</sha1>
    </revision>
    <revision>
      <id>14724</id>
      <parentid>14722</parentid>
      <timestamp>2015-01-28T20:39:37Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>14724</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1086" sha1="p90ajg3g750zv0du3zcgkq8ug0flp6e" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;&lt;font size="-3"&gt;[[Special:UserLogin|Log in]] | [[Special:OpenIDLogin|OpenID]] | [[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutz]] | [[Disclaimer|Haftungsausschluss]] | [[Investors]] | [[Donate]]
[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | {{Mirror_nyud_net}} | {{Mirror_tor2web_org}} | Share: {{Share}}
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;

This is a wiki. Want to improve this page? See [https://github.com/Whonix/Whonix/blob/master/debian/copyright Conditions for Contributions to Whonix], then {{Edit_it}}! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix ({{#widget:Whonix_g_plus_rel_publisher}}) is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted above, content of this  page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.
&lt;/font&gt;</text>
      <sha1>p90ajg3g750zv0du3zcgkq8ug0flp6e</sha1>
    </revision>
    <revision>
      <id>16089</id>
      <parentid>14724</parentid>
      <timestamp>2015-06-26T19:22:42Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>16089</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1147" sha1="p4320ygpc7phoaxdgorv3khhhbtehsv" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;&lt;font size="-3"&gt;[[Special:UserLogin|Log in]] | [[Special:OpenIDLogin|OpenID]] | [[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutz]] | [[Disclaimer|Haftungsausschluss]] | [[Investors]] | [[Donate]]
[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | {{Mirror_nyud_net}} | {{Mirror_tor2web_org}} | Share: {{Share}}
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;

This is a wiki. Want to improve this page? Help welcome, volunteer contributions are happily considered! See [https://github.com/Whonix/Whonix/blob/master/CONTRIBUTING.md Conditions for Contributions to Whonix], then {{Edit_it}}! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix ({{#widget:Whonix_g_plus_rel_publisher}}) is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted above, content of this  page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.
&lt;/font&gt;</text>
      <sha1>p4320ygpc7phoaxdgorv3khhhbtehsv</sha1>
    </revision>
    <revision>
      <id>19427</id>
      <parentid>16089</parentid>
      <timestamp>2015-11-27T18:55:17Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>19427</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1165" sha1="l2fpgnac6192dkwl02u4oxzgv5ein11" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;{{RandomNews}}&lt;hr&gt;&lt;font size="-3"&gt;[[Special:UserLogin|Log in]] | [[Special:OpenIDLogin|OpenID]] | [[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutz]] | [[Disclaimer|Haftungsausschluss]] | [[Investors]] | [[Donate]]
[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | {{Mirror_nyud_net}} | {{Mirror_tor2web_org}} | Share: {{Share}}
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(i2p) coralcdn .sdns .onion .i2p--&gt;

This is a wiki. Want to improve this page? Help welcome, volunteer contributions are happily considered! See [https://github.com/Whonix/Whonix/blob/master/CONTRIBUTING.md Conditions for Contributions to Whonix], then {{Edit_it}}! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix ({{#widget:Whonix_g_plus_rel_publisher}}) is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted above, content of this  page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.
&lt;/font&gt;</text>
      <sha1>l2fpgnac6192dkwl02u4oxzgv5ein11</sha1>
    </revision>
    <revision>
      <id>19533</id>
      <parentid>19427</parentid>
      <timestamp>2015-12-04T01:24:47Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "i2p" to "I2P"</comment>
      <origin>19533</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1165" sha1="hf04heziyr4lfmfcihtt8iqj4ybb8oh" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;{{RandomNews}}&lt;hr&gt;&lt;font size="-3"&gt;[[Special:UserLogin|Log in]] | [[Special:OpenIDLogin|OpenID]] | [[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutz]] | [[Disclaimer|Haftungsausschluss]] | [[Investors]] | [[Donate]]
[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | {{Mirror_nyud_net}} | {{Mirror_tor2web_org}} | Share: {{Share}}
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(I2P) coralcdn .sdns .onion .I2P--&gt;

This is a wiki. Want to improve this page? Help welcome, volunteer contributions are happily considered! See [https://github.com/Whonix/Whonix/blob/master/CONTRIBUTING.md Conditions for Contributions to Whonix], then {{Edit_it}}! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix ({{#widget:Whonix_g_plus_rel_publisher}}) is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted above, content of this  page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.
&lt;/font&gt;</text>
      <sha1>hf04heziyr4lfmfcihtt8iqj4ybb8oh</sha1>
    </revision>
    <revision>
      <id>21399</id>
      <parentid>19533</parentid>
      <timestamp>2016-01-06T00:08:46Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>21399</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1325" sha1="1poiirv8n9yqbaouq5ahgvh5r4vjv84" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;{{RandomNews}}&lt;hr&gt;&lt;font size="-3"&gt;[[Special:UserLogin|Log in]] | [[Special:OpenIDLogin|OpenID]] | [[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutz]] | [[Disclaimer|Haftungsausschluss]] | [[Investors]] | [[Donate]]
[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | {{Mirror_nyud_net}} | {{Mirror_tor2web_org}} | Share: {{Share}}
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(I2P) coralcdn .sdns .onion .I2P--&gt;

This is a wiki. Want to improve this page? Help welcome, volunteer contributions are happily considered! See [https://github.com/Whonix/Whonix/blob/master/CONTRIBUTING.md Conditions for Contributions to Whonix], then {{Edit_it}}! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix ({{#widget:Whonix_g_plus_rel_publisher}}) is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted above, content of this  page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.

Get a backup of this wiki.

* [https://github.com/Whonix/whonix-wiki-backup mediawiki markup]
* [https://github.com/WhonixBOT/WhonixWikiBackups mediawiki xml]
&lt;/font&gt;</text>
      <sha1>1poiirv8n9yqbaouq5ahgvh5r4vjv84</sha1>
    </revision>
    <revision>
      <id>22807</id>
      <parentid>21399</parentid>
      <timestamp>2016-04-03T13:44:58Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>22807</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1165" sha1="hf04heziyr4lfmfcihtt8iqj4ybb8oh" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;{{RandomNews}}&lt;hr&gt;&lt;font size="-3"&gt;[[Special:UserLogin|Log in]] | [[Special:OpenIDLogin|OpenID]] | [[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutz]] | [[Disclaimer|Haftungsausschluss]] | [[Investors]] | [[Donate]]
[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | {{Mirror_nyud_net}} | {{Mirror_tor2web_org}} | Share: {{Share}}
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(I2P) coralcdn .sdns .onion .I2P--&gt;

This is a wiki. Want to improve this page? Help welcome, volunteer contributions are happily considered! See [https://github.com/Whonix/Whonix/blob/master/CONTRIBUTING.md Conditions for Contributions to Whonix], then {{Edit_it}}! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix ({{#widget:Whonix_g_plus_rel_publisher}}) is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted above, content of this  page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.
&lt;/font&gt;</text>
      <sha1>hf04heziyr4lfmfcihtt8iqj4ybb8oh</sha1>
    </revision>
    <revision>
      <id>23088</id>
      <parentid>22807</parentid>
      <timestamp>2016-04-04T16:39:45Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>23088</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1056" sha1="76l0zhmeo89r7cs6gpaxjj28hxctnmj" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;{{RandomNews}}&lt;hr&gt;&lt;font size="-3"&gt;[[Special:UserLogin|Log in]] | [[Special:OpenIDLogin|OpenID]] | [[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutz]] | [[Disclaimer|Haftungsausschluss]] | [[Investors]] | [[Donate]]
Share: {{Share}}
&lt;!--
inspired by http://aboli.sh/
@cnpirates ssl(tor) ssl(I2P) coralcdn .sdns .onion .I2P--&gt;

This is a wiki. Want to improve this page? Help welcome, volunteer contributions are happily considered! See [https://github.com/Whonix/Whonix/blob/master/CONTRIBUTING.md Conditions for Contributions to Whonix], then {{Edit_it}}! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix ({{#widget:Whonix_g_plus_rel_publisher}}) is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted above, content of this  page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.
&lt;/font&gt;</text>
      <sha1>76l0zhmeo89r7cs6gpaxjj28hxctnmj</sha1>
    </revision>
    <revision>
      <id>23090</id>
      <parentid>23088</parentid>
      <timestamp>2016-04-04T16:40:18Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>23090</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="963" sha1="0s6v3f4pketphu2ruglnpjagb3vvtn4" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;{{RandomNews}}&lt;hr&gt;&lt;font size="-3"&gt;[[Special:UserLogin|Log in]] | [[Special:OpenIDLogin|OpenID]] | [[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutz]] | [[Disclaimer|Haftungsausschluss]] | [[Investors]] | [[Donate]]
Share: {{Share}}

This is a wiki. Want to improve this page? Help welcome, volunteer contributions are happily considered! See [https://github.com/Whonix/Whonix/blob/master/CONTRIBUTING.md Conditions for Contributions to Whonix], then {{Edit_it}}! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix ({{#widget:Whonix_g_plus_rel_publisher}}) is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted above, content of this  page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.
&lt;/font&gt;</text>
      <sha1>0s6v3f4pketphu2ruglnpjagb3vvtn4</sha1>
    </revision>
    <revision>
      <id>23091</id>
      <parentid>23090</parentid>
      <timestamp>2016-04-04T16:41:06Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>23091</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="930" sha1="keuws4xyxjq8idcami40ty84lz4as46" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;{{RandomNews}}&lt;hr&gt;&lt;font size="-3"&gt;[[Special:UserLogin|Log in]] | [[Contact|Contact]] | [[Impressum]] | [[Datenschutz|Datenschutz]] | [[Disclaimer|Haftungsausschluss]] | [[Investors]] | [[Donate]]
Share: {{Share}}

This is a wiki. Want to improve this page? Help welcome, volunteer contributions are happily considered! See [https://github.com/Whonix/Whonix/blob/master/CONTRIBUTING.md Conditions for Contributions to Whonix], then {{Edit_it}}! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix ({{#widget:Whonix_g_plus_rel_publisher}}) is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted above, content of this  page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Free (as in speech) [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself.
&lt;/font&gt;</text>
      <sha1>keuws4xyxjq8idcami40ty84lz4as46</sha1>
    </revision>
    <revision>
      <id>23093</id>
      <parentid>23091</parentid>
      <timestamp>2016-04-04T17:23:24Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>Replaced content with "&lt;br /&gt;&lt;hr&gt;{{RandomNews}}&lt;hr&gt; {{FooterLight}}"</comment>
      <origin>23093</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="44" sha1="aicb77go0dg5ila2c1kv3zqbl653kbh" xml:space="preserve">&lt;br /&gt;&lt;hr&gt;{{RandomNews}}&lt;hr&gt;
{{FooterLight}}</text>
      <sha1>aicb77go0dg5ila2c1kv3zqbl653kbh</sha1>
    </revision>
    <revision>
      <id>23096</id>
      <parentid>23093</parentid>
      <timestamp>2016-04-04T17:24:43Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>23096</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="34" sha1="mi2phomslx987j21s20d9wya4zbbe1z" xml:space="preserve">{{RandomNews}}&lt;hr&gt;
{{FooterLight}}</text>
      <sha1>mi2phomslx987j21s20d9wya4zbbe1z</sha1>
    </revision>
    <revision>
      <id>23097</id>
      <parentid>23096</parentid>
      <timestamp>2016-04-04T17:24:53Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>23097</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="30" sha1="9jbx9fgub6i2gv5cw5qiqpc8fp9qrt2" xml:space="preserve">{{RandomNews}}
{{FooterLight}}</text>
      <sha1>9jbx9fgub6i2gv5cw5qiqpc8fp9qrt2</sha1>
    </revision>
    <revision>
      <id>23102</id>
      <parentid>23097</parentid>
      <timestamp>2016-04-04T17:28:36Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>23102</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="72" sha1="8qqygadnhkpgaljit809ritjn7ueel0" xml:space="preserve">{{RandomNews}}
{{FooterLight}}
{{Footer this is a wiki}}
{{Foooter_OIN}}</text>
      <sha1>8qqygadnhkpgaljit809ritjn7ueel0</sha1>
    </revision>
    <revision>
      <id>23117</id>
      <parentid>23102</parentid>
      <timestamp>2016-04-06T14:03:40Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>23117</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="77" sha1="b3v06mn52udgtln3q43mkduobb53e5h" xml:space="preserve">&lt;hr&gt;
{{RandomNews}}
{{FooterLight}}
{{Footer this is a wiki}}
{{Foooter_OIN}}</text>
      <sha1>b3v06mn52udgtln3q43mkduobb53e5h</sha1>
    </revision>
    <revision>
      <id>29763</id>
      <parentid>23117</parentid>
      <timestamp>2017-04-30T12:43:29Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <origin>29763</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="79" sha1="nbihceayyqu9ryk7xbogm6x1g3rs538" xml:space="preserve">&lt;hr&gt;
{{RandomNews}}
{{FooterLight}}

{{Footer this is a wiki}}

{{Foooter_OIN}}</text>
      <sha1>nbihceayyqu9ryk7xbogm6x1g3rs538</sha1>
    </revision>
    <revision>
      <id>31793</id>
      <parentid>29763</parentid>
      <timestamp>2018-01-06T04:11:50Z</timestamp>
      <contributor>
        <username>Mrscreenshot</username>
        <id>4497</id>
      </contributor>
      <minor/>
      <comment>Protected "[[Template:Footer]]" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))</comment>
      <origin>31793</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="79" sha1="nbihceayyqu9ryk7xbogm6x1g3rs538" xml:space="preserve">&lt;hr&gt;
{{RandomNews}}
{{FooterLight}}

{{Footer this is a wiki}}

{{Foooter_OIN}}</text>
      <sha1>nbihceayyqu9ryk7xbogm6x1g3rs538</sha1>
    </revision>
    <revision>
      <id>39661</id>
      <parentid>31793</parentid>
      <timestamp>2018-11-20T11:04:27Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>39661</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="172" sha1="c68ngr9qwa2q0lzu1ojdf2g0y827e83" xml:space="preserve">&lt;hr&gt;
{{RandomNews}}
{{FooterLight}}

{{Footer this is a wiki}}

{{Foooter_OIN}}

&lt;font size=-1&gt;Whonix is provided by ENCRYPTED SUPPORT LP. See [[Impressum|Imprint]].&lt;/font&gt;</text>
      <sha1>c68ngr9qwa2q0lzu1ojdf2g0y827e83</sha1>
    </revision>
    <revision>
      <id>40058</id>
      <parentid>39661</parentid>
      <timestamp>2018-12-14T14:32:48Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>40058</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1069" sha1="k4qygxocdhqx9q7kpuqfpw0cmhjg90d" xml:space="preserve">&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;&lt;font size="-1"&gt;[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_Whonix.org|forcing]]) [http://{{Whonix_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
Share: {{Share}}&lt;/font&gt;

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! See [https://github.com/Whonix/Whonix/blob/master/CONTRIBUTING.md Conditions for Contributions to Whonix], then {{Edit_it}}! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.&lt;/font&gt;

&lt;font size="-1"&gt;Whonix is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted, the content of this page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Libre Software [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself. ([[Why_Whonix_is_Free_Software|Why?]])&lt;/font&gt;

&lt;font size=-1&gt;Whonix is provided by ENCRYPTED SUPPORT LP. See [[Impressum|Imprint]].&lt;/font&gt;</text>
      <sha1>k4qygxocdhqx9q7kpuqfpw0cmhjg90d</sha1>
    </revision>
    <revision>
      <id>40418</id>
      <parentid>40058</parentid>
      <timestamp>2019-01-09T15:59:43Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>40418</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1260" sha1="bmz9ksp29md7mo49k5838gmjrmly38c" xml:space="preserve">&lt;hr&gt;
&lt;font size="-1"&gt;Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See [[Wiki Comments Policy]].&lt;/font&gt;
&lt;comments /&gt;
&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;&lt;font size="-1"&gt;[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_Whonix.org|forcing]]) [http://{{Whonix_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
Share: {{Share}}&lt;/font&gt;

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! See [https://github.com/Whonix/Whonix/blob/master/CONTRIBUTING.md Conditions for Contributions to Whonix], then {{Edit_it}}! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.&lt;/font&gt;

&lt;font size="-1"&gt;Whonix is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted, the content of this page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Libre Software [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself. ([[Why_Whonix_is_Free_Software|Why?]])&lt;/font&gt;

&lt;font size=-1&gt;Whonix is provided by ENCRYPTED SUPPORT LP. See [[Impressum|Imprint]].&lt;/font&gt;</text>
      <sha1>bmz9ksp29md7mo49k5838gmjrmly38c</sha1>
    </revision>
    <revision>
      <id>40880</id>
      <parentid>40418</parentid>
      <timestamp>2019-02-12T18:41:47Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>40880</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1307" sha1="q0r58nhqr46myqv0g7pzs6yxttnk6t7" xml:space="preserve">&lt;hr&gt;
&lt;font size="-1"&gt;No user support in comments. See [[Support]].

Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See [[Wiki Comments Policy]].&lt;/font&gt;
&lt;comments /&gt;
&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;&lt;font size="-1"&gt;[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_Whonix.org|forcing]]) [http://{{Whonix_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
Share: {{Share}}&lt;/font&gt;

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! See [https://github.com/Whonix/Whonix/blob/master/CONTRIBUTING.md Conditions for Contributions to Whonix], then {{Edit_it}}! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.&lt;/font&gt;

&lt;font size="-1"&gt;Whonix is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted, the content of this page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Libre Software [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself. ([[Why_Whonix_is_Free_Software|Why?]])&lt;/font&gt;

&lt;font size=-1&gt;Whonix is provided by ENCRYPTED SUPPORT LP. See [[Impressum|Imprint]].&lt;/font&gt;</text>
      <sha1>q0r58nhqr46myqv0g7pzs6yxttnk6t7</sha1>
    </revision>
    <revision>
      <id>41016</id>
      <parentid>40880</parentid>
      <timestamp>2019-02-23T04:27:46Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>41016</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1333" sha1="4m4wa3exj1pllyagk54xqmam6p5sm36" xml:space="preserve">&lt;hr&gt;
&lt;font size="-1"&gt;No user support in comments. See [[Support]].

Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See [[Wiki Comments Policy]].&lt;/font&gt;
&lt;comments /&gt;
&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;&lt;font size="-1"&gt;[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_Whonix.org|forcing]]) [http://{{Whonix_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
Share: {{Share}}&lt;/font&gt;

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [https://github.com/Whonix/Whonix/blob/master/CONTRIBUTING.md Conditions for Contributions to Whonix], then {{Edit_it}}! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.&lt;/font&gt;

&lt;font size="-1"&gt;Whonix is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted, the content of this page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Libre Software [https://github.com/Whonix/Whonix/blob/master/debian/copyright license] as Whonix itself. ([[Why_Whonix_is_Free_Software|Why?]])&lt;/font&gt;

&lt;font size=-1&gt;Whonix is provided by ENCRYPTED SUPPORT LP. See [[Impressum|Imprint]].&lt;/font&gt;</text>
      <sha1>4m4wa3exj1pllyagk54xqmam6p5sm36</sha1>
    </revision>
    <revision>
      <id>41017</id>
      <parentid>41016</parentid>
      <timestamp>2019-02-23T04:34:41Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>41017</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1350" sha1="jzttxzv7bsfapcfnb28bl01hrk1dq1i" xml:space="preserve">&lt;hr&gt;
&lt;font size="-1"&gt;No user support in comments. See [[Support]].

Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See [[Wiki Comments Policy]].&lt;/font&gt;
&lt;comments /&gt;
&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;&lt;font size="-1"&gt;[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_Whonix.org|forcing]]) [http://{{Whonix_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
Share: {{Share}}&lt;/font&gt;

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [https://github.com/Whonix/Whonix/blob/master/CONTRIBUTING.md Conditions for Contributions to Whonix], then {{Edit_it}}! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.&lt;/font&gt;

&lt;font size="-1"&gt;
Copyright (C) 2019 {{name}}. [[Whonix Trademark Policy|Whonix is a trademark.]]

Unless otherwise noted, the content of this page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Libre Software [[Whonix:Copyrights#License|license]] as Whonix itself. ([[Why_Whonix_is_Free_Software|Why?]])

Whonix is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network.

Whonix is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>jzttxzv7bsfapcfnb28bl01hrk1dq1i</sha1>
    </revision>
    <revision>
      <id>41264</id>
      <parentid>41017</parentid>
      <timestamp>2019-03-03T16:30:16Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>41264</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1326" sha1="6qrwzx3kkz6egdkc2w0empe2kaxktqp" xml:space="preserve">&lt;hr&gt;
&lt;font size="-1"&gt;No user support in comments. See [[Support]].

Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See [[Wiki Comments Policy]].&lt;/font&gt;
&lt;comments /&gt;
&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;&lt;font size="-1"&gt;[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_Whonix.org|forcing]]) [http://{{Whonix_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
Share: {{Share}}&lt;/font&gt;

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [https://github.com/Whonix/Whonix/blob/master/CONTRIBUTING.md Conditions for Contributions to Whonix], then {{Edit_it}}! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Copyright (C) 2019 {{name}}. [[Whonix Trademark Policy|Whonix is a trademark.]]

Unless otherwise noted, the content of this page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Libre Software [[Whonix:Copyrights#License|license]] as Whonix itself. ([[Why_Whonix_is_Free_Software|Why?]])

Whonix is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network.

Whonix is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>6qrwzx3kkz6egdkc2w0empe2kaxktqp</sha1>
    </revision>
    <revision>
      <id>41265</id>
      <parentid>41264</parentid>
      <timestamp>2019-03-03T16:31:13Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>41265</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1498" sha1="h2j1nki9nltnnj83bhdesjq6y21qfhc" xml:space="preserve">&lt;hr&gt;
&lt;font size="-1"&gt;No user support in comments. See [[Support]].

Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See [[Wiki Comments Policy]].&lt;/font&gt;
&lt;comments /&gt;
&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;&lt;font size="-1"&gt;[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_Whonix.org|forcing]]) [http://{{Whonix_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
Share: {{Share}}&lt;/font&gt;

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [https://github.com/Whonix/Whonix/blob/master/CONTRIBUTING.md Conditions for Contributions to Whonix], then {{Edit_it}}! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Copyright (C) 2019 {{name}}. [[Whonix Trademark Policy|Whonix is a trademark.]]

Unless otherwise noted, the content of this page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Libre Software [[Whonix:Copyrights#License|license]] as Whonix itself. ([[Why_Whonix_is_Free_Software|Why?]])

Whonix is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. Whonix is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>h2j1nki9nltnnj83bhdesjq6y21qfhc</sha1>
    </revision>
    <revision>
      <id>41266</id>
      <parentid>41265</parentid>
      <timestamp>2019-03-03T16:32:24Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>41266</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1496" sha1="cjfoueaw8j8lgcx43y26yz4ruh068lf" xml:space="preserve">&lt;hr&gt;
&lt;font size="-1"&gt;No user support in comments. See [[Support]].

Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See [[Wiki Comments Policy]].&lt;/font&gt;
&lt;comments /&gt;
&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;&lt;font size="-1"&gt;[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_Whonix.org|forcing]]) [http://{{Whonix_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
Share: {{Share}}&lt;/font&gt;

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[Whonix:Copyrights#Conditions_for_Contributions_to_Whonix|Conditions for Contributions to Whonix]], then {{Edit_it}}! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Copyright (C) 2019 {{name}}. [[Whonix Trademark Policy|Whonix is a trademark.]]

Unless otherwise noted, the content of this page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Libre Software [[Whonix:Copyrights#License|license]] as Whonix itself. ([[Why_Whonix_is_Free_Software|Why?]])

Whonix is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. Whonix is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>cjfoueaw8j8lgcx43y26yz4ruh068lf</sha1>
    </revision>
    <revision>
      <id>41267</id>
      <parentid>41266</parentid>
      <timestamp>2019-03-03T16:32:35Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>41267</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1503" sha1="n5ybqgoypw58mtzlj6tbtlbl5q81scf" xml:space="preserve">&lt;hr&gt;
&lt;font size="-1"&gt;No user support in comments. See [[Support]].

Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See [[Wiki Comments Policy]].&lt;/font&gt;
&lt;comments /&gt;
&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;&lt;font size="-1"&gt;[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_Whonix.org|forcing]]) [http://{{Whonix_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
Share: {{Share}}&lt;/font&gt;

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[Whonix:Copyrights#Conditions_for_Contributions_to_Whonix|Conditions for Contributions to Whonix]], then {{Edit_it}}! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[Whonix Trademark Policy|Whonix is a trademark.]]

Unless otherwise noted, the content of this page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Libre Software [[Whonix:Copyrights#License|license]] as Whonix itself. ([[Why_Whonix_is_Free_Software|Why?]])

Whonix is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. Whonix is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>n5ybqgoypw58mtzlj6tbtlbl5q81scf</sha1>
    </revision>
    <revision>
      <id>41268</id>
      <parentid>41267</parentid>
      <timestamp>2019-03-03T16:33:20Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>remove duplication with Privacy Policy</comment>
      <origin>41268</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1439" sha1="8s7a636g89zl374gbe50yzpiv3014z3" xml:space="preserve">&lt;hr&gt;
&lt;font size="-1"&gt;No user support in comments. See [[Support]].

Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See [[Wiki Comments Policy]].&lt;/font&gt;
&lt;comments /&gt;
&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;&lt;font size="-1"&gt;[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_Whonix.org|forcing]]) [http://{{Whonix_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
Share: {{Share}}&lt;/font&gt;

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[Whonix:Copyrights#Conditions_for_Contributions_to_Whonix|Conditions for Contributions to Whonix]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[Whonix Trademark Policy|Whonix is a trademark.]]

Unless otherwise noted, the content of this page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Libre Software [[Whonix:Copyrights#License|license]] as Whonix itself. ([[Why_Whonix_is_Free_Software|Why?]])

Whonix is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. Whonix is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>8s7a636g89zl374gbe50yzpiv3014z3</sha1>
    </revision>
    <revision>
      <id>41269</id>
      <parentid>41268</parentid>
      <timestamp>2019-03-03T16:35:56Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>41269</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1437" sha1="j69mxiylzhiuibpw4fnb99g5dtf9h5j" xml:space="preserve">&lt;hr&gt;
&lt;font size="-1"&gt;No user support in comments. See [[Support]].

Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See [[Wiki Comments Policy]].&lt;/font&gt;
&lt;comments /&gt;
&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;&lt;font size="-1"&gt;[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_Whonix.org|forcing]]) [http://{{Whonix_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
Share: {{Share}}&lt;/font&gt;

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[Whonix:Copyrights#Conditions_for_Contributions_to_Whonix|Conditions for Contributions to Whonix]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[Whonix Trademark Policy|Whonix is a trademark.]] Whonix is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted, the content of this page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Libre Software [[Whonix:Copyrights#License|license]] as Whonix itself. ([[Why_Whonix_is_Free_Software|Why?]])

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. Whonix is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>j69mxiylzhiuibpw4fnb99g5dtf9h5j</sha1>
    </revision>
    <revision>
      <id>41624</id>
      <parentid>41269</parentid>
      <timestamp>2019-03-16T06:25:05Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "Libre Software" to "Freedom Software"</comment>
      <origin>41624</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1439" sha1="p3949e7qw64hqbs9z0qu76h0rqncg7k" xml:space="preserve">&lt;hr&gt;
&lt;font size="-1"&gt;No user support in comments. See [[Support]].

Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See [[Wiki Comments Policy]].&lt;/font&gt;
&lt;comments /&gt;
&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;&lt;font size="-1"&gt;[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_Whonix.org|forcing]]) [http://{{Whonix_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
Share: {{Share}}&lt;/font&gt;

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[Whonix:Copyrights#Conditions_for_Contributions_to_Whonix|Conditions for Contributions to Whonix]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[Whonix Trademark Policy|Whonix is a trademark.]] Whonix is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted, the content of this page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Freedom Software [[Whonix:Copyrights#License|license]] as Whonix itself. ([[Why_Whonix_is_Free_Software|Why?]])

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. Whonix is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>p3949e7qw64hqbs9z0qu76h0rqncg7k</sha1>
    </revision>
    <revision>
      <id>41871</id>
      <parentid>41624</parentid>
      <timestamp>2019-03-24T18:47:36Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "Why_Whonix_is_Free_Software" to "Why_Whonix_is_Freedom_Software"</comment>
      <origin>41871</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1442" sha1="eliq0sflc0v0byjm1cytn9m36gl2kyt" xml:space="preserve">&lt;hr&gt;
&lt;font size="-1"&gt;No user support in comments. See [[Support]].

Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See [[Wiki Comments Policy]].&lt;/font&gt;
&lt;comments /&gt;
&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;&lt;font size="-1"&gt;[https://www.whonix.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_Whonix.org|forcing]]) [http://{{Whonix_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
Share: {{Share}}&lt;/font&gt;

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[Whonix:Copyrights#Conditions_for_Contributions_to_Whonix|Conditions for Contributions to Whonix]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[Whonix Trademark Policy|Whonix is a trademark.]] Whonix is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted, the content of this page is [[Whonix:Copyrights|copyrighted]] and licensed under the same Freedom Software [[Whonix:Copyrights#License|license]] as Whonix itself. ([[Why_Whonix_is_Freedom_Software|Why?]])

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. Whonix is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>eliq0sflc0v0byjm1cytn9m36gl2kyt</sha1>
    </revision>
    <revision>
      <id>45207</id>
      <parentid>41871</parentid>
      <timestamp>2019-04-22T20:54:45Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>45207</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1614" sha1="e9oxg50pi4q6anttxo3mc2vyidjoxct" xml:space="preserve">&lt;hr&gt;
&lt;font size="-1"&gt;No user support in comments. See [[Support]].

Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See [[Wiki Comments Policy]].&lt;/font&gt;
&lt;comments /&gt;
&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;&lt;font size="-1"&gt;[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{Whonix_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
Share: {{Share}}&lt;/font&gt;

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>e9oxg50pi4q6anttxo3mc2vyidjoxct</sha1>
    </revision>
    <revision>
      <id>45592</id>
      <parentid>45207</parentid>
      <timestamp>2019-04-25T11:51:32Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "{{Whonix_onion}}" to "{{project_onion}}"</comment>
      <origin>45592</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1615" sha1="1b4900bw94nlcbbx61fqq53pzpl8ckp" xml:space="preserve">&lt;hr&gt;
&lt;font size="-1"&gt;No user support in comments. See [[Support]].

Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See [[Wiki Comments Policy]].&lt;/font&gt;
&lt;comments /&gt;
&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;&lt;font size="-1"&gt;[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
Share: {{Share}}&lt;/font&gt;

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>1b4900bw94nlcbbx61fqq53pzpl8ckp</sha1>
    </revision>
    <revision>
      <id>47217</id>
      <parentid>45592</parentid>
      <timestamp>2019-05-11T07:33:48Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>follow https://www.debian.org/trademark</comment>
      <origin>47217</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1744" sha1="658a6gsdsb3nciu284fj0jdnmycro3h" xml:space="preserve">&lt;hr&gt;
&lt;font size="-1"&gt;No user support in comments. See [[Support]].

Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See [[Wiki Comments Policy]].&lt;/font&gt;
&lt;comments /&gt;
&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;&lt;font size="-1"&gt;[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
Share: {{Share}}&lt;/font&gt;

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is not affiliated with Debian. Debian is a registered trademark owned by Software in the Public Interest, Inc.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>658a6gsdsb3nciu284fj0jdnmycro3h</sha1>
    </revision>
    <revision>
      <id>47218</id>
      <parentid>47217</parentid>
      <timestamp>2019-05-11T07:35:26Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>47218</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1764" sha1="ao7vnjhee0yprut40mpv9hg7unc8vu5" xml:space="preserve">&lt;hr&gt;
&lt;font size="-1"&gt;No user support in comments. See [[Support]].

Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See [[Wiki Comments Policy]].&lt;/font&gt;
&lt;comments /&gt;
&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;&lt;font size="-1"&gt;[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
Share: {{Share}}&lt;/font&gt;

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with Debian. Debian is a registered trademark owned by Software in the Public Interest, Inc.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>ao7vnjhee0yprut40mpv9hg7unc8vu5</sha1>
    </revision>
    <revision>
      <id>47219</id>
      <parentid>47218</parentid>
      <timestamp>2019-05-11T07:38:20Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>follow https://2019.www.torproject.org/docs/trademark-faq.html.en</comment>
      <origin>47219</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1963" sha1="awoinbqyt533dmkhoxwqgcdiag7o4hh" xml:space="preserve">&lt;hr&gt;
&lt;font size="-1"&gt;No user support in comments. See [[Support]].

Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See [[Wiki Comments Policy]].&lt;/font&gt;
&lt;comments /&gt;
&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;&lt;font size="-1"&gt;[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
Share: {{Share}}&lt;/font&gt;

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [http://www.openinventionnetwork.com/licensees.php licensee] of the Open Invention Network. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with Debian. Debian is a registered trademark owned by Software in the Public Interest, Inc.

{{project name}} is produced independently from the [https://www.torproject.org/ Tor]® anonymity software and carries no guarantee from The Tor Project about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>awoinbqyt533dmkhoxwqgcdiag7o4hh</sha1>
    </revision>
    <revision>
      <id>47220</id>
      <parentid>47219</parentid>
      <timestamp>2019-05-11T07:42:08Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>47220</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2125" sha1="g9skujetmlbd8oss7o7fk3ypjrvonik" xml:space="preserve">&lt;hr&gt;
&lt;font size="-1"&gt;No user support in comments. See [[Support]].

Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See [[Wiki Comments Policy]].&lt;/font&gt;
&lt;comments /&gt;
&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;&lt;font size="-1"&gt;[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
Share: {{Share}}&lt;/font&gt;

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with Debian. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>g9skujetmlbd8oss7o7fk3ypjrvonik</sha1>
    </revision>
    <revision>
      <id>47221</id>
      <parentid>47220</parentid>
      <timestamp>2019-05-11T07:42:50Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>47221</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2150" sha1="1acdadbrn3tmh033x3o0j2fvlz8m9ct" xml:space="preserve">&lt;hr&gt;
&lt;font size="-1"&gt;No user support in comments. See [[Support]].

Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See [[Wiki Comments Policy]].&lt;/font&gt;
&lt;comments /&gt;
&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;&lt;font size="-1"&gt;[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
Share: {{Share}}&lt;/font&gt;

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>1acdadbrn3tmh033x3o0j2fvlz8m9ct</sha1>
    </revision>
    <revision>
      <id>47952</id>
      <parentid>47221</parentid>
      <timestamp>2019-06-10T14:20:28Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>47952</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2253" sha1="80ut7ui3ceqrorqs1muu3hguxftxa21" xml:space="preserve">&lt;hr&gt;
&lt;font size="-1"&gt;No comments for now due to spam. Use [https://forums.whonix.org/ Whonix forums] instead.

&lt;!--No user support in comments. See [[Support]]. Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See [[Wiki Comments Policy]].&lt;/font&gt;--&gt;
&lt;!--&lt;comments /&gt;--&gt;
&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;&lt;font size="-1"&gt;[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
Share: {{Share}}&lt;/font&gt;

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>80ut7ui3ceqrorqs1muu3hguxftxa21</sha1>
    </revision>
    <revision>
      <id>48703</id>
      <parentid>47952</parentid>
      <timestamp>2019-06-22T08:34:56Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>48703</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2423" sha1="ptxza5azms4w73rul65ronjq1hozozt" xml:space="preserve">&lt;hr&gt;
&lt;font size="-1"&gt;No comments for now due to spam. Use [https://forums.whonix.org/ Whonix forums] instead.

&lt;!--No user support in comments. See [[Support]]. Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See [[Wiki Comments Policy]].&lt;/font&gt;--&gt;
&lt;!--&lt;comments /&gt;--&gt;
&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;&lt;font size="-1"&gt;[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
&lt;font size="-1"&gt;[[Contribute#Follow|Follow]]: [https://twitter.com/Whonix Twitter] | [https://www.facebook.com/Whonix Facebook] | [https://gab.com/Whonix gab.ai]&lt;/font&gt;

Share: {{Share}}&lt;/font&gt;

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>ptxza5azms4w73rul65ronjq1hozozt</sha1>
    </revision>
    <revision>
      <id>48706</id>
      <parentid>48703</parentid>
      <timestamp>2019-06-22T09:01:56Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>48706</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2499" sha1="26i893oqqttowyhkrn5xh0598gprmp9" xml:space="preserve">&lt;hr&gt;
&lt;font size="-1"&gt;No comments for now due to spam. Use [https://forums.whonix.org/ Whonix forums] instead.

&lt;!--No user support in comments. See [[Support]]. Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See [[Wiki Comments Policy]].&lt;/font&gt;--&gt;
&lt;!--&lt;comments /&gt;--&gt;
&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;&lt;font size="-1"&gt;[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
&lt;font size="-1"&gt;[[Contribute#Follow|Follow]]: [https://twitter.com/Whonix Twitter] | [https://www.facebook.com/Whonix Facebook] | [https://gab.com/Whonix gab.ai] | [[Stay_Tuned|Stay Tuned]] | [[Stay_Tuned#Whonix_News_Forums|Whonix News]]&lt;/font&gt;

Share: {{Share}}&lt;/font&gt;

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>26i893oqqttowyhkrn5xh0598gprmp9</sha1>
    </revision>
    <revision>
      <id>48707</id>
      <parentid>48706</parentid>
      <timestamp>2019-06-22T09:02:41Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>48707</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2535" sha1="d7wmf51r88ry7mzwz688k9f0t5agg05" xml:space="preserve">&lt;hr&gt;
&lt;font size="-1"&gt;No comments for now due to spam. Use [https://forums.whonix.org/ Whonix forums] instead.

&lt;!--No user support in comments. See [[Support]]. Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See [[Wiki Comments Policy]].&lt;/font&gt;--&gt;
&lt;!--&lt;comments /&gt;--&gt;
&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;&lt;font size="-1"&gt;[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
&lt;font size="-1"&gt;[[Contribute#Follow|Follow]]: [https://twitter.com/Whonix Twitter] | [https://www.facebook.com/Whonix Facebook] | [https://gab.com/Whonix gab.ai] | [[Stay_Tuned|Stay Tuned]] | [[Stay_Tuned#Whonix_News_Forums|Whonix News]]&lt;/font&gt;

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}&lt;/font&gt;

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>d7wmf51r88ry7mzwz688k9f0t5agg05</sha1>
    </revision>
    <revision>
      <id>49975</id>
      <parentid>48707</parentid>
      <timestamp>2019-08-11T13:21:44Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>49975</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2530" sha1="9jx7t4np6fvz216ejtfb4dagnjittlp" xml:space="preserve">&lt;hr&gt;
&lt;font size="-1"&gt;
&lt;!--
No comments for now due to spam. Use [https://forums.whonix.org/ Whonix forums] instead.
--&gt;
No user support in comments. See [[Support]]. Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See [[Wiki Comments Policy]].&lt;/font&gt;
&lt;comments /&gt;
&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;&lt;font size="-1"&gt;[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
&lt;font size="-1"&gt;[[Contribute#Follow|Follow]]: [https://twitter.com/Whonix Twitter] | [https://www.facebook.com/Whonix Facebook] | [https://gab.com/Whonix gab.ai] | [[Stay_Tuned|Stay Tuned]] | [[Stay_Tuned#Whonix_News_Forums|Whonix News]]&lt;/font&gt;

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}&lt;/font&gt;

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>9jx7t4np6fvz216ejtfb4dagnjittlp</sha1>
    </revision>
    <revision>
      <id>51399</id>
      <parentid>49975</parentid>
      <timestamp>2019-09-27T06:14:06Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>Undo revision 49975 by [[Special:Contributions/Patrick|Patrick]] ([[User talk:Patrick|talk]])</comment>
      <origin>51399</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2535" sha1="d7wmf51r88ry7mzwz688k9f0t5agg05" xml:space="preserve">&lt;hr&gt;
&lt;font size="-1"&gt;No comments for now due to spam. Use [https://forums.whonix.org/ Whonix forums] instead.

&lt;!--No user support in comments. See [[Support]]. Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See [[Wiki Comments Policy]].&lt;/font&gt;--&gt;
&lt;!--&lt;comments /&gt;--&gt;
&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;&lt;font size="-1"&gt;[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
&lt;font size="-1"&gt;[[Contribute#Follow|Follow]]: [https://twitter.com/Whonix Twitter] | [https://www.facebook.com/Whonix Facebook] | [https://gab.com/Whonix gab.ai] | [[Stay_Tuned|Stay Tuned]] | [[Stay_Tuned#Whonix_News_Forums|Whonix News]]&lt;/font&gt;

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}&lt;/font&gt;

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>d7wmf51r88ry7mzwz688k9f0t5agg05</sha1>
    </revision>
    <revision>
      <id>51456</id>
      <parentid>51399</parentid>
      <timestamp>2019-10-07T13:24:38Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>51456</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2489" sha1="mvipei2xknfsshvratvu1qam0nqur85" xml:space="preserve">&lt;hr&gt;
&lt;font size="-1"&gt;No comments for now due to spam. Use [https://forums.whonix.org/ Whonix forums] instead.

&lt;!--No user support in comments. See [[Support]]. Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See [[Wiki Comments Policy]].&lt;/font&gt;--&gt;
&lt;!--&lt;comments /&gt;--&gt;
&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
[[Contribute#Follow|Follow]]: [https://twitter.com/Whonix Twitter] | [https://www.facebook.com/Whonix Facebook] | [https://gab.com/Whonix gab.ai] | [[Stay_Tuned|Stay Tuned]] | [[Stay_Tuned#Whonix_News_Forums|Whonix News]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>mvipei2xknfsshvratvu1qam0nqur85</sha1>
    </revision>
    <revision>
      <id>51458</id>
      <parentid>51456</parentid>
      <timestamp>2019-10-07T13:57:33Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>51458</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2510" sha1="h14lmm0swaaje0yajh9bls8pn65pp9s" xml:space="preserve">&lt;hr&gt;
&lt;font size="-1"&gt;No comments for now due to spam. Use [https://forums.whonix.org/ Whonix forums] instead.

&lt;!--No user support in comments. See [[Support]]. Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See [[Wiki Comments Policy]].&lt;/font&gt;--&gt;
&lt;!--&lt;comments /&gt;--&gt;
&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
[[Contribute#Follow|Follow]]: [https://twitter.com/Whonix Twitter] | [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] | [https://gab.com/Whonix gab.ai] | [[Stay_Tuned|Stay Tuned]] | [[Stay_Tuned#Whonix_News_Forums|Whonix News]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>h14lmm0swaaje0yajh9bls8pn65pp9s</sha1>
    </revision>
    <revision>
      <id>51460</id>
      <parentid>51458</parentid>
      <timestamp>2019-10-07T14:00:29Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>51460</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2529" sha1="o6wuqqqlgeaoyqpsgwzxaofv2tl40nc" xml:space="preserve">&lt;hr&gt;
&lt;font size="-1"&gt;No comments for now due to spam. Use [https://forums.whonix.org/ Whonix forums] instead.

&lt;!--No user support in comments. See [[Support]]. Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See [[Wiki Comments Policy]].&lt;/font&gt;--&gt;
&lt;!--&lt;comments /&gt;--&gt;
&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
[[Contribute#Follow|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] | [https://gab.com/Whonix gab.ai] | [[Stay_Tuned|Stay Tuned]] | [[Stay_Tuned#Whonix_News_Forums|Whonix News]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>o6wuqqqlgeaoyqpsgwzxaofv2tl40nc</sha1>
    </revision>
    <revision>
      <id>51463</id>
      <parentid>51460</parentid>
      <timestamp>2019-10-07T14:04:47Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>51463</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2500" sha1="okbq0yhbinsl93p70cg26j0d062wpkf" xml:space="preserve">&lt;hr&gt;
&lt;font size="-1"&gt;No comments for now due to spam. Use [https://forums.whonix.org/ Whonix forums] instead.

&lt;!--No user support in comments. See [[Support]]. Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See [[Wiki Comments Policy]].&lt;/font&gt;--&gt;
&lt;!--&lt;comments /&gt;--&gt;
&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] https://gab.com/Whonix gab.ai] [[File:rss.png|50px|link=Stay_Tuned#Whonix_News_Forums]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>okbq0yhbinsl93p70cg26j0d062wpkf</sha1>
    </revision>
    <revision>
      <id>51464</id>
      <parentid>51463</parentid>
      <timestamp>2019-10-07T14:05:02Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>51464</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2492" sha1="hp0kdfk8l7cvdtrn7qlz4takvb2rswa" xml:space="preserve">&lt;hr&gt;
&lt;font size="-1"&gt;No comments for now due to spam. Use [https://forums.whonix.org/ Whonix forums] instead.

&lt;!--No user support in comments. See [[Support]]. Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See [[Wiki Comments Policy]].&lt;/font&gt;--&gt;
&lt;!--&lt;comments /&gt;--&gt;
&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] https://gab.com/Whonix [[File:rss.png|50px|link=Stay_Tuned#Whonix_News_Forums]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>hp0kdfk8l7cvdtrn7qlz4takvb2rswa</sha1>
    </revision>
    <revision>
      <id>51466</id>
      <parentid>51464</parentid>
      <timestamp>2019-10-07T14:18:17Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>51466</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2541" sha1="oyl368n23jo417efkalj2b1xbv39a68" xml:space="preserve">&lt;hr&gt;
&lt;font size="-1"&gt;No comments for now due to spam. Use [https://forums.whonix.org/ Whonix forums] instead.

&lt;!--No user support in comments. See [[Support]]. Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See [[Wiki Comments Policy]].&lt;/font&gt;--&gt;
&lt;!--&lt;comments /&gt;--&gt;
&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=Stay_Tuned#Whonix_News_Forums]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>oyl368n23jo417efkalj2b1xbv39a68</sha1>
    </revision>
    <revision>
      <id>51468</id>
      <parentid>51466</parentid>
      <timestamp>2019-10-07T14:20:02Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>51468</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2623" sha1="gc3fnbzr6m3zpsu9pfbeer5msx6omn7" xml:space="preserve">&lt;hr&gt;
&lt;font size="-1"&gt;No comments for now due to spam. Use [https://forums.whonix.org/ Whonix forums] instead.

&lt;!--No user support in comments. See [[Support]]. Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See [[Wiki Comments Policy]].&lt;/font&gt;--&gt;
&lt;!--&lt;comments /&gt;--&gt;
&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=Stay_Tuned#Whonix_News_Forums]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_All_News]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>gc3fnbzr6m3zpsu9pfbeer5msx6omn7</sha1>
    </revision>
    <revision>
      <id>51517</id>
      <parentid>51468</parentid>
      <timestamp>2019-10-12T11:25:58Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>51517</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2282" sha1="5dv931t0ree9tbxy3eoafgizlp2d973" xml:space="preserve">&lt;hr&gt;
{{RandomNews}}
&lt;hr&gt;[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=Stay_Tuned#Whonix_News_Forums]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_All_News]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>5dv931t0ree9tbxy3eoafgizlp2d973</sha1>
    </revision>
    <revision>
      <id>51519</id>
      <parentid>51517</parentid>
      <timestamp>2019-10-12T11:31:43Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>51519</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2504" sha1="c8ym7xgmgtw8wn5v8o4a10s9jj3w9ht" xml:space="preserve">&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
[advertisement] '''Looking to Sell Your Company?''' [[Contact#For_Private_Inquiries|Contact]] me.
&lt;/div&gt;
&lt;br /&gt;
{{RandomNews}}
&lt;hr&gt;[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=Stay_Tuned#Whonix_News_Forums]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_All_News]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>c8ym7xgmgtw8wn5v8o4a10s9jj3w9ht</sha1>
    </revision>
    <revision>
      <id>51520</id>
      <parentid>51519</parentid>
      <timestamp>2019-10-12T11:32:34Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>51520</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2505" sha1="025vknv9cqf1dlye07npdsiztihjb4s" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
[advertisement] '''Looking to Sell Your Company?''' [[Contact#For_Private_Inquiries|Contact]] me.
&lt;/div&gt;
&lt;br /&gt;
{{RandomNews}}
[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=Stay_Tuned#Whonix_News_Forums]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_All_News]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>025vknv9cqf1dlye07npdsiztihjb4s</sha1>
    </revision>
    <revision>
      <id>51549</id>
      <parentid>51520</parentid>
      <timestamp>2019-10-17T16:40:10Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>51549</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2501" sha1="9hss3pfqz3bgv4y3j6q6gryzr3alam7" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
[advertisement] '''Looking to Sell Your Company?''' [[Contact#For_Private_Inquiries|Contact]] me.
&lt;/div&gt;
&lt;br /&gt;
{{RandomNews}}
[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=Stay_Tuned#Whonix_News_Forums]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>9hss3pfqz3bgv4y3j6q6gryzr3alam7</sha1>
    </revision>
    <revision>
      <id>52120</id>
      <parentid>51549</parentid>
      <timestamp>2019-11-05T15:30:26Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>52120</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2274" sha1="9o3gsl56ju49pjd6ygfnaccocd2qcol" xml:space="preserve">&lt;hr&gt;
{{RandomNews}}
[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=Stay_Tuned#Whonix_News_Forums]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>9o3gsl56ju49pjd6ygfnaccocd2qcol</sha1>
    </revision>
    <revision>
      <id>52125</id>
      <parentid>52120</parentid>
      <timestamp>2019-11-05T15:35:11Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>52125</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2338" sha1="pzbw7tvdv5h4v4l6c5kuymtkxglis5f" xml:space="preserve">&lt;hr&gt;
{{RandomNews}}
[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=Stay_Tuned#Whonix_News_Forums]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>pzbw7tvdv5h4v4l6c5kuymtkxglis5f</sha1>
    </revision>
    <revision>
      <id>52314</id>
      <parentid>52125</parentid>
      <timestamp>2019-11-08T08:41:32Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>52314</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2600" sha1="t4z1eua2032d2eyha68bku1bw7chhrz" xml:space="preserve">&lt;hr&gt;
{{RandomNews}}
[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=Stay_Tuned#Whonix_News_Forums]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=monero:{{Pay Monero}}]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>t4z1eua2032d2eyha68bku1bw7chhrz</sha1>
    </revision>
    <revision>
      <id>52315</id>
      <parentid>52314</parentid>
      <timestamp>2019-11-08T08:42:21Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>52315</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2585" sha1="ac6k6228yzphqeukk27d8rboji72bj9" xml:space="preserve">&lt;hr&gt;
{{RandomNews}}
[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=Stay_Tuned#Whonix_News_Forums]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>ac6k6228yzphqeukk27d8rboji72bj9</sha1>
    </revision>
    <revision>
      <id>52318</id>
      <parentid>52315</parentid>
      <timestamp>2019-11-08T08:58:04Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>52318</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2645" sha1="9gwn6p64rv5646no9zmkqcrffgt4b82" xml:space="preserve">&lt;hr&gt;
{{RandomNews}}
[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=Stay_Tuned#Whonix_News_Forums]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>9gwn6p64rv5646no9zmkqcrffgt4b82</sha1>
    </revision>
    <revision>
      <id>52319</id>
      <parentid>52318</parentid>
      <timestamp>2019-11-08T09:05:21Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>52319</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2701" sha1="3thkd8nu3i8q3icba2uoyl3gxuk68x4" xml:space="preserve">&lt;hr&gt;
{{RandomNews}}
[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=Stay_Tuned#Whonix_News_Forums]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>3thkd8nu3i8q3icba2uoyl3gxuk68x4</sha1>
    </revision>
    <revision>
      <id>52320</id>
      <parentid>52319</parentid>
      <timestamp>2019-11-08T09:07:05Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>52320</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2776" sha1="mw6idsyx3p453nnmesxoz4uchg7vmju" xml:space="preserve">&lt;hr&gt;
{{RandomNews}}
[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=Stay_Tuned#Whonix_News_Forums]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>mw6idsyx3p453nnmesxoz4uchg7vmju</sha1>
    </revision>
    <revision>
      <id>52352</id>
      <parentid>52320</parentid>
      <timestamp>2019-11-08T10:12:50Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>52352</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2858" sha1="lbp6556t0f04twtivgvugboksie5fjf" xml:space="preserve">&lt;hr&gt;
{{RandomNews}}
[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=Stay_Tuned#Whonix_News_Forums]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>lbp6556t0f04twtivgvugboksie5fjf</sha1>
    </revision>
    <revision>
      <id>52353</id>
      <parentid>52352</parentid>
      <timestamp>2019-11-08T10:16:16Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>52353</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2859" sha1="04cssqkjct6852xzxojtdm5w2g0wu1h" xml:space="preserve">&lt;hr&gt;
{{RandomNews}}
[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=Stay_Tuned#Whonix_News_Forums]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].

[[File:Monero donate whonix.png|100px]]
&lt;/font&gt;</text>
      <sha1>04cssqkjct6852xzxojtdm5w2g0wu1h</sha1>
    </revision>
    <revision>
      <id>52354</id>
      <parentid>52353</parentid>
      <timestamp>2019-11-08T10:16:32Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>52354</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2859" sha1="cix1ay1iccssci1q475oy4b12awnfys" xml:space="preserve">&lt;hr&gt;
{{RandomNews}}
[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=Stay_Tuned#Whonix_News_Forums]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].

[[File:Monero donate whonix.png|200px]]
&lt;/font&gt;</text>
      <sha1>cix1ay1iccssci1q475oy4b12awnfys</sha1>
    </revision>
    <revision>
      <id>52770</id>
      <parentid>52354</parentid>
      <timestamp>2019-11-18T09:38:48Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>52770</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3125" sha1="kl1qak7e4qdp03kmlyanxydtx68sn0d" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
&lt;u&gt;Advertisement&lt;/u&gt;:&lt;br/&gt;
{{project name}} is [https://evolution-host.com/vps-hosting.php Supported by Evolution Host DDoS Protected VPS]
&lt;/div&gt;
&lt;hr&gt;
{{RandomNews}}
[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=Stay_Tuned#Whonix_News_Forums]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].

[[File:Monero donate whonix.png|200px]]
&lt;/font&gt;</text>
      <sha1>kl1qak7e4qdp03kmlyanxydtx68sn0d</sha1>
    </revision>
    <revision>
      <id>52774</id>
      <parentid>52770</parentid>
      <timestamp>2019-11-18T10:21:46Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>52774</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3059" sha1="a3qg3ghpyjzkddn9fra3oyb1dfnkfro" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
&lt;u&gt;Advertisement&lt;/u&gt;:&lt;br/&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;
{{RandomNews}}
[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=Stay_Tuned#Whonix_News_Forums]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].

[[File:Monero donate whonix.png|200px]]
&lt;/font&gt;</text>
      <sha1>a3qg3ghpyjzkddn9fra3oyb1dfnkfro</sha1>
    </revision>
    <revision>
      <id>52806</id>
      <parentid>52774</parentid>
      <timestamp>2019-11-18T11:40:33Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>52806</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3032" sha1="5daqofpviu41hejues9i0wsf3ks6z0l" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;
{{RandomNews}}
[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=Stay_Tuned#Whonix_News_Forums]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].

[[File:Monero donate whonix.png|200px]]
&lt;/font&gt;</text>
      <sha1>5daqofpviu41hejues9i0wsf3ks6z0l</sha1>
    </revision>
    <revision>
      <id>53224</id>
      <parentid>52806</parentid>
      <timestamp>2019-12-04T06:23:56Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>53224</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3171" sha1="rx254yk3zrclobrv6o0pkr4vitygxgz" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;
{{RandomNews}}
[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=Stay_Tuned#Whonix_News_Forums]] [[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].


&lt;/font&gt;</text>
      <sha1>rx254yk3zrclobrv6o0pkr4vitygxgz</sha1>
    </revision>
    <revision>
      <id>53226</id>
      <parentid>53224</parentid>
      <timestamp>2019-12-04T06:26:58Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>53226</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3191" sha1="mnn1u9nsl0dvjef4ilq4p5sxks5kaw5" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;
{{RandomNews}}
[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=https://forums.whonix.org/tags/important-news.rss]] [[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].


&lt;/font&gt;</text>
      <sha1>mnn1u9nsl0dvjef4ilq4p5sxks5kaw5</sha1>
    </revision>
    <revision>
      <id>53227</id>
      <parentid>53226</parentid>
      <timestamp>2019-12-04T06:31:21Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>53227</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3193" sha1="dhmtwh9gtwh9fpi1n43wqca8gyn60xr" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=https://forums.whonix.org/tags/important-news.rss]] [[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}} https] | ([[Forcing_.onion_on_{{project name short}}.org|forcing]]) [http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}} onion]&lt;br /&gt;

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].


&lt;/font&gt;</text>
      <sha1>dhmtwh9gtwh9fpi1n43wqca8gyn60xr</sha1>
    </revision>
    <revision>
      <id>54032</id>
      <parentid>53227</parentid>
      <timestamp>2020-01-01T07:46:13Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>54032</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3189" sha1="9gwn0evsov4z2ssc9ondsdn7fsc8vra" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=https://forums.whonix.org/tags/important-news.rss]] [[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|link=http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].


&lt;/font&gt;</text>
      <sha1>9gwn0evsov4z2ssc9ondsdn7fsc8vra</sha1>
    </revision>
    <revision>
      <id>54033</id>
      <parentid>54032</parentid>
      <timestamp>2020-01-01T07:46:47Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>54033</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3219" sha1="n3o6tsf0lyzhv69r01xyeae8jmt1rc9" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=https://forums.whonix.org/tags/important-news.rss]] [[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].


&lt;/font&gt;</text>
      <sha1>n3o6tsf0lyzhv69r01xyeae8jmt1rc9</sha1>
    </revision>
    <revision>
      <id>54312</id>
      <parentid>54033</parentid>
      <timestamp>2020-01-22T19:07:28Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>54312</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3380" sha1="nlbeyt5fkwcg77a8xp4qbhh3qj5g9ez" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=https://forums.whonix.org/tags/important-news.rss]] [[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].


&lt;/font&gt;
{{#seo:
|article:publisher=https://www.facebook.com/{{project_name_short}}
|author=https://www.facebook.com/{{project_name_short}}
|fb:admins=100007482551659
}}</text>
      <sha1>nlbeyt5fkwcg77a8xp4qbhh3qj5g9ez</sha1>
    </revision>
    <revision>
      <id>54313</id>
      <parentid>54312</parentid>
      <timestamp>2020-01-22T19:07:55Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>54313</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3378" sha1="gwwnejjhj0bpxzdmdu8kx4mpwnpxzem" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=https://forums.whonix.org/tags/important-news.rss]] [[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;
{{#seo:
|article:publisher=https://www.facebook.com/{{project_name_short}}
|author=https://www.facebook.com/{{project_name_short}}
|fb:admins=100007482551659
}}</text>
      <sha1>gwwnejjhj0bpxzdmdu8kx4mpwnpxzem</sha1>
    </revision>
    <revision>
      <id>54331</id>
      <parentid>54313</parentid>
      <timestamp>2020-01-25T09:23:21Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>54331</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3405" sha1="qvb4c5vvh341nw7oji42uzr6b79jq63" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=https://forums.whonix.org/tags/important-news.rss]] [[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;
{{#seo:
|article:publisher=https://www.facebook.com/{{project_name_short}}
|author=https://www.facebook.com/{{project_name_short}}
|fb:admins=100007482551659
|fb:app_id=606207202785157
}}</text>
      <sha1>qvb4c5vvh341nw7oji42uzr6b79jq63</sha1>
    </revision>
    <revision>
      <id>54332</id>
      <parentid>54331</parentid>
      <timestamp>2020-01-25T09:24:53Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>54332</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3378" sha1="gwwnejjhj0bpxzdmdu8kx4mpwnpxzem" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=https://forums.whonix.org/tags/important-news.rss]] [[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;
{{#seo:
|article:publisher=https://www.facebook.com/{{project_name_short}}
|author=https://www.facebook.com/{{project_name_short}}
|fb:admins=100007482551659
}}</text>
      <sha1>gwwnejjhj0bpxzdmdu8kx4mpwnpxzem</sha1>
    </revision>
    <revision>
      <id>54333</id>
      <parentid>54332</parentid>
      <timestamp>2020-01-25T11:42:56Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>54333</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3217" sha1="e99k6k7iimam6epy47jj6wcmkaodpfz" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=https://forums.whonix.org/tags/important-news.rss]] [[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>e99k6k7iimam6epy47jj6wcmkaodpfz</sha1>
    </revision>
    <revision>
      <id>55561</id>
      <parentid>54333</parentid>
      <timestamp>2020-03-28T17:00:28Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>55561</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3204" sha1="poca4xjqmq70fkezofoxcp8pap5kprs" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]] [[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2019 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>poca4xjqmq70fkezofoxcp8pap5kprs</sha1>
    </revision>
    <revision>
      <id>55907</id>
      <parentid>55561</parentid>
      <timestamp>2020-04-15T17:05:16Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>55907</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3204" sha1="c7635ulhatkt4nmvwkovk75rquyo9dn" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]] [[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>c7635ulhatkt4nmvwkovk75rquyo9dn</sha1>
    </revision>
    <revision>
      <id>56155</id>
      <parentid>55907</parentid>
      <timestamp>2020-04-23T12:48:28Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>56155</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3473" sha1="7u6adpwqhlc98kxqrc5chtibqfxc4or" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;

search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}}

&lt;hr&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]] [[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>7u6adpwqhlc98kxqrc5chtibqfxc4or</sha1>
    </revision>
    <revision>
      <id>56256</id>
      <parentid>56155</parentid>
      <timestamp>2020-04-27T06:49:47Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>56256</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3482" sha1="386wnuqtxsqdy0xm2g2ohuyum7oylo9" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;

search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}}

&lt;hr&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]  [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]] [[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat_No_Media]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>386wnuqtxsqdy0xm2g2ohuyum7oylo9</sha1>
    </revision>
    <revision>
      <id>56319</id>
      <parentid>56256</parentid>
      <timestamp>2020-04-29T15:36:40Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>56319</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3607" sha1="016ah8wd41hct91ox5ybp6jufx1my0x" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;

search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}}

&lt;hr&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]] [[File:Iconfinder news 18421.png|50px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]] [[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat_No_Media]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]].
&lt;/font&gt;</text>
      <sha1>016ah8wd41hct91ox5ybp6jufx1my0x</sha1>
    </revision>
    <revision>
      <id>56924</id>
      <parentid>56319</parentid>
      <timestamp>2020-05-08T22:33:45Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>56924</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3628" sha1="6l7fns2tjckfov9ixcjkb0su65tb8yo" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;

search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}}

&lt;hr&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]] [[File:Iconfinder news 18421.png|50px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]] [[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat_No_Media]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>6l7fns2tjckfov9ixcjkb0su65tb8yo</sha1>
    </revision>
    <revision>
      <id>57060</id>
      <parentid>56924</parentid>
      <timestamp>2020-05-15T10:46:34Z</timestamp>
      <contributor>
        <username>Buffy</username>
        <id>4651</id>
      </contributor>
      <minor/>
      <comment>Capitalize</comment>
      <origin>57060</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3628" sha1="7al72y3jr2sloflzldbdd5nvdyljo97" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}}

&lt;hr&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]] [[File:Iconfinder news 18421.png|50px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]] [[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat_No_Media]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>7al72y3jr2sloflzldbdd5nvdyljo97</sha1>
    </revision>
    <revision>
      <id>57857</id>
      <parentid>57060</parentid>
      <timestamp>2020-06-09T20:39:45Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>57857</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3632" sha1="25o9lxz0a4vxkwf6umfher3kqsjdxrv" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}}

&lt;hr&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]] [[File:Iconfinder news 18421.png|50px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]] [[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat_No_Media]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>25o9lxz0a4vxkwf6umfher3kqsjdxrv</sha1>
    </revision>
    <revision>
      <id>57877</id>
      <parentid>57857</parentid>
      <timestamp>2020-06-10T16:59:31Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>57877</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3847" sha1="qy5vght944lvjpl7flk2v2y97ekmfuc" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}}

&lt;hr&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]] [[File:Iconfinder news 18421.png|50px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]] [[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat_No_Media]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
[https://forums.whonix.org/t/onion-forum-site-redirects-to-clearnet/197/18 debug onion] (ignore this): sitename: &lt;code&gt;{{SITENAME}}&lt;/code&gt;, server: &lt;code&gt;{{SERVER}}&lt;/code&gt;, servername: &lt;code&gt;{{SERVERNAME}}&lt;/code&gt;

This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>qy5vght944lvjpl7flk2v2y97ekmfuc</sha1>
    </revision>
    <revision>
      <id>57881</id>
      <parentid>57877</parentid>
      <timestamp>2020-06-10T21:34:49Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>57881</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3777" sha1="26lsnzikcvrrh872wiz0ijdrs0mllkx" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}}

&lt;hr&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]] [[File:Iconfinder news 18421.png|50px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]] [[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat_No_Media]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
[https://forums.whonix.org/t/onion-forum-site-redirects-to-clearnet/197/18 debug onion] (ignore this): servername: &lt;code&gt;{{SERVERNAME}}&lt;/code&gt;

This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>26lsnzikcvrrh872wiz0ijdrs0mllkx</sha1>
    </revision>
    <revision>
      <id>57892</id>
      <parentid>57881</parentid>
      <timestamp>2020-06-11T10:57:32Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>57892</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3800" sha1="4x1sin7h508kjgxg46ibqi5ikblweko" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}}

&lt;hr&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]] [[File:Iconfinder news 18421.png|50px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]] [[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat_No_Media]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
&lt;noinclude&gt;[https://forums.whonix.org/t/onion-forum-site-redirects-to-clearnet/197/18 debug onion] (ignore this): servername: &lt;code&gt;{{SERVERNAME}}&lt;/code&gt;&lt;/noinclude&gt;

This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>4x1sin7h508kjgxg46ibqi5ikblweko</sha1>
    </revision>
    <revision>
      <id>57893</id>
      <parentid>57892</parentid>
      <timestamp>2020-06-11T10:58:29Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>57893</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3799" sha1="o2if5ejl9874e6qgu177cdlga0oahkr" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}}

&lt;hr&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]] [[File:Iconfinder news 18421.png|50px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]] [[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat_No_Media]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;&lt;noinclude&gt;[https://forums.whonix.org/t/onion-forum-site-redirects-to-clearnet/197/18 debug onion] (ignore this): servername: &lt;code&gt;{{SERVERNAME}}&lt;/code&gt;&lt;/noinclude&gt;

This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>o2if5ejl9874e6qgu177cdlga0oahkr</sha1>
    </revision>
    <revision>
      <id>57894</id>
      <parentid>57893</parentid>
      <timestamp>2020-06-11T10:58:59Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>57894</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3798" sha1="4q4dz965qumqud4h4h0jluc5lrgaj4f" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}}

&lt;hr&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]] [[File:Iconfinder news 18421.png|50px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]] [[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat_No_Media]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]
&lt;font size="-1"&gt;&lt;noinclude&gt;[https://forums.whonix.org/t/onion-forum-site-redirects-to-clearnet/197/18 debug onion] (ignore this): servername: &lt;code&gt;{{SERVERNAME}}&lt;/code&gt;&lt;/noinclude&gt;

This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>4q4dz965qumqud4h4h0jluc5lrgaj4f</sha1>
    </revision>
    <revision>
      <id>57895</id>
      <parentid>57894</parentid>
      <timestamp>2020-06-11T10:59:37Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>57895</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3796" sha1="4pa1qpymyhk2k7pt9o0pi4ygxwexc8i" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}}

&lt;hr&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]] [[File:Iconfinder news 18421.png|50px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]] [[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat_No_Media]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]
&lt;font size="-1"&gt;&lt;noinclude&gt;[https://forums.whonix.org/t/onion-forum-site-redirects-to-clearnet/197/18 debug onion] (ignore this): servername: &lt;code&gt;{{SERVERNAME}}&lt;/code&gt;&lt;/noinclude&gt;This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>4pa1qpymyhk2k7pt9o0pi4ygxwexc8i</sha1>
    </revision>
    <revision>
      <id>57896</id>
      <parentid>57895</parentid>
      <timestamp>2020-06-11T11:00:02Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>57896</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3797" sha1="sn4m6z7n0lb0asr6mbj4l4oz3z8lhu5" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}}

&lt;hr&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]] [[File:Iconfinder news 18421.png|50px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]] [[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat_No_Media]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]
&lt;font size="-1"&gt;&lt;noinclude&gt;[https://forums.whonix.org/t/onion-forum-site-redirects-to-clearnet/197/18 debug onion] (ignore this): servername: &lt;code&gt;{{SERVERNAME}}&lt;/code&gt;&lt;/noinclude&gt;
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>sn4m6z7n0lb0asr6mbj4l4oz3z8lhu5</sha1>
    </revision>
    <revision>
      <id>57897</id>
      <parentid>57896</parentid>
      <timestamp>2020-06-11T11:00:20Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>57897</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3798" sha1="4q4dz965qumqud4h4h0jluc5lrgaj4f" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}}

&lt;hr&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]] [[File:Iconfinder news 18421.png|50px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]] [[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat_No_Media]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]
&lt;font size="-1"&gt;&lt;noinclude&gt;[https://forums.whonix.org/t/onion-forum-site-redirects-to-clearnet/197/18 debug onion] (ignore this): servername: &lt;code&gt;{{SERVERNAME}}&lt;/code&gt;&lt;/noinclude&gt;

This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>4q4dz965qumqud4h4h0jluc5lrgaj4f</sha1>
    </revision>
    <revision>
      <id>58284</id>
      <parentid>57897</parentid>
      <timestamp>2020-06-22T20:18:54Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>58284</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3852" sha1="q8371f6dybss6pyrwq0rqshvvz3iqgi" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}}

&lt;hr&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]] [[File:Iconfinder news 18421.png|50px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]] [[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat_No_Media]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]
&lt;font size="-1"&gt;&lt;noinclude&gt;[https://forums.whonix.org/t/onion-forum-site-redirects-to-clearnet/197/18 debug onion] (ignore this): servername: &lt;code&gt;{{SERVERNAME}}&lt;/code&gt;&lt;/noinclude&gt;

This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of Whonix Website and Whonix Chat]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>q8371f6dybss6pyrwq0rqshvvz3iqgi</sha1>
    </revision>
    <revision>
      <id>58299</id>
      <parentid>58284</parentid>
      <timestamp>2020-06-23T15:15:58Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>58299</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3973" sha1="m4ofwjph3ath9dxpozuuhc0cakz1ix5" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}}

&lt;hr&gt;
[[Stay Tuned|Follow]]: [[File:twitter.png|50px|link=https://twitter.com/Whonix]] [[File:facebook.png|50px|link=https://www.facebook.com/Whonix]] [[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]] [[File:Iconfinder news 18421.png|50px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]] [[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]] [[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat_No_Media]] [[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]] [[File:Reddit.jpg|50px|link=https://www.reddit.com/r/Whonix]] [[File:Diaspora.png|50px|link=https://diasp.org/u/whonix]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]
&lt;font size="-1"&gt;&lt;noinclude&gt;[https://forums.whonix.org/t/onion-forum-site-redirects-to-clearnet/197/18 debug onion] (ignore this): servername: &lt;code&gt;{{SERVERNAME}}&lt;/code&gt;&lt;/noinclude&gt;

This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of Whonix Website and Whonix Chat]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>m4ofwjph3ath9dxpozuuhc0cakz1ix5</sha1>
    </revision>
    <revision>
      <id>58305</id>
      <parentid>58299</parentid>
      <timestamp>2020-06-23T16:20:46Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>58305</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="4099" sha1="9e047su4h7r0udj3vfkqzvi9hhj03bj" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}}

&lt;hr&gt;
[[Stay Tuned|Follow]]:
[[File:twitter.png|50px|link=https://twitter.com/Whonix]]
[[File:facebook.png|50px|link=https://www.facebook.com/Whonix]]
[[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]
[[File:Iconfinder news 18421.png|50px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]]
[[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]]
[[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat_No_Media]]
[[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]
[[File:Reddit.jpg|50px|link=https://www.reddit.com/r/Whonix]]
[[File:Diaspora.png|50px|link=https://diasp.org/u/whonix]]
[[File:Gnusocial.png|50px|link=https://gnusocial.cc/whonix]]
[[File:Mewe.png|50px|link=https://mewe.com/i/whonixanonymousos]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]
&lt;font size="-1"&gt;&lt;noinclude&gt;[https://forums.whonix.org/t/onion-forum-site-redirects-to-clearnet/197/18 debug onion] (ignore this): servername: &lt;code&gt;{{SERVERNAME}}&lt;/code&gt;&lt;/noinclude&gt;

This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of Whonix Website and Whonix Chat]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>9e047su4h7r0udj3vfkqzvi9hhj03bj</sha1>
    </revision>
    <revision>
      <id>58307</id>
      <parentid>58305</parentid>
      <timestamp>2020-06-23T16:28:31Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>58307</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="4175" sha1="m0kky30r6sm8v3azfinac5dtfyb4zvf" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}}

&lt;hr&gt;
[[Stay Tuned|Follow]]:
[[File:twitter.png|50px|link=https://twitter.com/Whonix]]
[[File:facebook.png|50px|link=https://www.facebook.com/Whonix]]
[[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]
[[File:Iconfinder news 18421.png|50px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]]
[[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]]
[[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat_No_Media]]
[[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]
[[File:Reddit.jpg|50px|link=https://www.reddit.com/r/Whonix]]
[[File:Diaspora.png|50px|link=https://diasp.org/u/whonix]]
[[File:Gnusocial.png|50px|link=https://gnusocial.cc/whonix]]
[[File:Mewe.png|50px|link=https://mewe.com/i/whonixanonymousos]]
[[File:500px-Tumblr Wordmark.svg.png|50px|link=https://whonix.tumblr.com/]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]
&lt;font size="-1"&gt;&lt;noinclude&gt;[https://forums.whonix.org/t/onion-forum-site-redirects-to-clearnet/197/18 debug onion] (ignore this): servername: &lt;code&gt;{{SERVERNAME}}&lt;/code&gt;&lt;/noinclude&gt;

This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of Whonix Website and Whonix Chat]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>m0kky30r6sm8v3azfinac5dtfyb4zvf</sha1>
    </revision>
    <revision>
      <id>58310</id>
      <parentid>58307</parentid>
      <timestamp>2020-06-23T16:32:06Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>58310</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="4263" sha1="btpvp12bgt12ndat942rfxa1sothl0c" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}}

&lt;hr&gt;
[[Stay Tuned|Follow]]:
[[File:twitter.png|50px|link=https://twitter.com/Whonix]]
[[File:facebook.png|50px|link=https://www.facebook.com/Whonix]]
[[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]
[[File:Iconfinder news 18421.png|50px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]]
[[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]]
[[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat_No_Media]]
[[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]
[[File:Reddit.jpg|50px|link=https://www.reddit.com/r/Whonix]]
[[File:Diaspora.png|50px|link=https://diasp.org/u/whonix]]
[[File:Gnusocial.png|50px|link=https://gnusocial.cc/whonix]]
[[File:Mewe.png|50px|link=https://mewe.com/i/whonixanonymousos]]
[[File:500px-Tumblr Wordmark.svg.png|50px|link=https://whonix.tumblr.com/]]
[[File:Iconfinder youtube 317714.png|50px|link=https://www.youtube.com/user/adrelanos]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]
&lt;font size="-1"&gt;&lt;noinclude&gt;[https://forums.whonix.org/t/onion-forum-site-redirects-to-clearnet/197/18 debug onion] (ignore this): servername: &lt;code&gt;{{SERVERNAME}}&lt;/code&gt;&lt;/noinclude&gt;

This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of Whonix Website and Whonix Chat]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>btpvp12bgt12ndat942rfxa1sothl0c</sha1>
    </revision>
    <revision>
      <id>58313</id>
      <parentid>58310</parentid>
      <timestamp>2020-06-23T16:36:46Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>58313</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="4432" sha1="jqb4y2jv29k1qhzbulll4yzdwyuzhn2" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}}

&lt;hr&gt;
[[Stay Tuned|Follow]]:
[[File:twitter.png|50px|link=https://twitter.com/Whonix]]
[[File:facebook.png|50px|link=https://www.facebook.com/Whonix]]
[[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]
[[File:Iconfinder news 18421.png|50px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]]
[[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]]
[[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat_No_Media]]
[[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]
[[File:Reddit.jpg|50px|link=https://www.reddit.com/r/Whonix]]
[[File:Diaspora.png|50px|link=https://diasp.org/u/whonix]]
[[File:Gnusocial.png|50px|link=https://gnusocial.cc/whonix]]
[[File:Mewe.png|50px|link=https://mewe.com/i/whonixanonymousos]]
[[File:500px-Tumblr Wordmark.svg.png|50px|link=https://whonix.tumblr.com/]]
[[File:Iconfinder youtube 317714.png|50px|link=https://www.youtube.com/user/adrelanos]]
[[File:200px-Minds logo.svg.png|50px|link=https://www.minds.com/Whonix]]
[[File:200px-Mastodon Logotype (Simple).svg.png|50px|link=https://mastodon.technology/@whonix]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]
&lt;font size="-1"&gt;&lt;noinclude&gt;[https://forums.whonix.org/t/onion-forum-site-redirects-to-clearnet/197/18 debug onion] (ignore this): servername: &lt;code&gt;{{SERVERNAME}}&lt;/code&gt;&lt;/noinclude&gt;

This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of Whonix Website and Whonix Chat]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>jqb4y2jv29k1qhzbulll4yzdwyuzhn2</sha1>
    </revision>
    <revision>
      <id>58315</id>
      <parentid>58313</parentid>
      <timestamp>2020-06-23T16:51:05Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>58315</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="4524" sha1="6gihhbr66q3r9airiglsy0vy72mqv8x" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}}

&lt;hr&gt;
[[Stay Tuned|Follow]]:
[[File:twitter.png|50px|link=https://twitter.com/Whonix]]
[[File:facebook.png|50px|link=https://www.facebook.com/Whonix]]
[[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]
[[File:Iconfinder news 18421.png|50px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]]
[[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]]
[[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat_No_Media]]
[[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]
[[File:Reddit.jpg|50px|link=https://www.reddit.com/r/Whonix]]
[[File:Diaspora.png|50px|link=https://diasp.org/u/whonix]]
[[File:Gnusocial.png|50px|link=https://gnusocial.cc/whonix]]
[[File:Mewe.png|50px|link=https://mewe.com/i/whonixanonymousos]]
[[File:500px-Tumblr Wordmark.svg.png|50px|link=https://whonix.tumblr.com/]]
[[File:Iconfinder youtube 317714.png|50px|link=https://www.youtube.com/user/adrelanos]]
[[File:200px-Minds logo.svg.png|50px|link=https://www.minds.com/Whonix]]
[[File:200px-Mastodon Logotype (Simple).svg.png|50px|link=https://mastodon.technology/@whonix]]
[[File:200px-LinkedIn Logo 2013.svg.png|50px|link=https://www.linkedin.com/company/whonix]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]
&lt;font size="-1"&gt;&lt;noinclude&gt;[https://forums.whonix.org/t/onion-forum-site-redirects-to-clearnet/197/18 debug onion] (ignore this): servername: &lt;code&gt;{{SERVERNAME}}&lt;/code&gt;&lt;/noinclude&gt;

This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of Whonix Website and Whonix Chat]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>6gihhbr66q3r9airiglsy0vy72mqv8x</sha1>
    </revision>
    <revision>
      <id>58319</id>
      <parentid>58315</parentid>
      <timestamp>2020-06-23T17:59:58Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>58319</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="4579" sha1="kxrjunjzgmzvejt2b4zfyznv74747hz" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}}

&lt;hr&gt;
[[Stay Tuned|Follow]]:
[[File:twitter.png|50px|link=https://twitter.com/Whonix]]
[[File:facebook.png|50px|link=https://www.facebook.com/Whonix]]
[[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]
[[File:Iconfinder news 18421.png|50px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]]
[[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]]
[[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat_No_Media]]
[[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]
[[File:Reddit.jpg|50px|link=https://www.reddit.com/r/Whonix]]
[[File:Diaspora.png|50px|link=https://diasp.org/u/whonix]]
[[File:Gnusocial.png|50px|link=https://gnusocial.cc/whonix]]
[[File:Mewe.png|50px|link=https://mewe.com/i/whonixanonymousos]]
[[File:500px-Tumblr Wordmark.svg.png|50px|link=https://whonix.tumblr.com/]]
[[File:Iconfinder youtube 317714.png|50px|link=https://www.youtube.com/user/adrelanos]]
[[File:200px-Minds logo.svg.png|50px|link=https://www.minds.com/Whonix]]
[[File:200px-Mastodon Logotype (Simple).svg.png|50px|link=https://mastodon.technology/@whonix]]
[[File:200px-LinkedIn Logo 2013.svg.png|50px|link=https://www.linkedin.com/company/whonix]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=#Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]
&lt;font size="-1"&gt;&lt;noinclude&gt;[https://forums.whonix.org/t/onion-forum-site-redirects-to-clearnet/197/18 debug onion] (ignore this): servername: &lt;code&gt;{{SERVERNAME}}&lt;/code&gt;&lt;/noinclude&gt;

This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of Whonix Website and Whonix Chat]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>kxrjunjzgmzvejt2b4zfyznv74747hz</sha1>
    </revision>
    <revision>
      <id>58320</id>
      <parentid>58319</parentid>
      <timestamp>2020-06-23T18:09:25Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>58320</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="4578" sha1="65z30bs82v6lfq9dc4vjzfau044rq85" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}}

&lt;hr&gt;
[[Stay Tuned|Follow]]:
[[File:twitter.png|50px|link=https://twitter.com/Whonix]]
[[File:facebook.png|50px|link=https://www.facebook.com/Whonix]]
[[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]
[[File:Iconfinder news 18421.png|50px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]]
[[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]]
[[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat_No_Media]]
[[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]
[[File:Reddit.jpg|50px|link=https://www.reddit.com/r/Whonix]]
[[File:Diaspora.png|50px|link=https://diasp.org/u/whonix]]
[[File:Gnusocial.png|50px|link=https://gnusocial.cc/whonix]]
[[File:Mewe.png|50px|link=https://mewe.com/i/whonixanonymousos]]
[[File:500px-Tumblr Wordmark.svg.png|50px|link=https://whonix.tumblr.com/]]
[[File:Iconfinder youtube 317714.png|50px|link=https://www.youtube.com/user/adrelanos]]
[[File:200px-Minds logo.svg.png|50px|link=https://www.minds.com/Whonix]]
[[File:200px-Mastodon Logotype (Simple).svg.png|50px|link=https://mastodon.technology/@whonix]]
[[File:200px-LinkedIn Logo 2013.svg.png|50px|link=https://www.linkedin.com/company/whonix]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]
&lt;font size="-1"&gt;&lt;noinclude&gt;[https://forums.whonix.org/t/onion-forum-site-redirects-to-clearnet/197/18 debug onion] (ignore this): servername: &lt;code&gt;{{SERVERNAME}}&lt;/code&gt;&lt;/noinclude&gt;

This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of Whonix Website and Whonix Chat]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>65z30bs82v6lfq9dc4vjzfau044rq85</sha1>
    </revision>
    <revision>
      <id>58321</id>
      <parentid>58320</parentid>
      <timestamp>2020-06-23T18:21:20Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>58321</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="4413" sha1="sswc8gyof67s6qp8bnotc6em386ikc2" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}}

&lt;hr&gt;
[[Stay Tuned|Follow]]:
[[File:twitter.png|50px|link=https://twitter.com/Whonix]]
[[File:facebook.png|50px|link=https://www.facebook.com/Whonix]]
[[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]
[[File:Iconfinder news 18421.png|50px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]]
[[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]]
[[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat_No_Media]]
[[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]
[[File:Reddit.jpg|50px|link=https://www.reddit.com/r/Whonix]]
[[File:Diaspora.png|50px|link=https://diasp.org/u/whonix]]
[[File:Gnusocial.png|50px|link=https://gnusocial.cc/whonix]]
[[File:Mewe.png|50px|link=https://mewe.com/i/whonixanonymousos]]
[[File:500px-Tumblr Wordmark.svg.png|50px|link=https://whonix.tumblr.com/]]
[[File:Iconfinder youtube 317714.png|50px|link=https://www.youtube.com/user/adrelanos]]
[[File:200px-Minds logo.svg.png|50px|link=https://www.minds.com/Whonix]]
[[File:200px-Mastodon Logotype (Simple).svg.png|50px|link=https://mastodon.technology/@whonix]]
[[File:200px-LinkedIn Logo 2013.svg.png|50px|link=https://www.linkedin.com/company/whonix]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of Whonix Website and Whonix Chat]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>sswc8gyof67s6qp8bnotc6em386ikc2</sha1>
    </revision>
    <revision>
      <id>58322</id>
      <parentid>58321</parentid>
      <timestamp>2020-06-23T18:30:43Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>58322</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="4434" sha1="fixver4pff79vqb7dszbtw9cczisfte" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}}

&lt;hr&gt;
[[Official_Whonix_Online_Profiles|Follow]]:
[[File:twitter.png|50px|link=https://twitter.com/Whonix]]
[[File:facebook.png|50px|link=https://www.facebook.com/Whonix]]
[[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]
[[File:Iconfinder news 18421.png|50px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]]
[[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/!ldUrkJMMqFScVZBdYN:tchncs.de?via=matrix.org&amp;via=tchncs.de&amp;via=privacytools.io]]
[[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat_No_Media]]
[[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]
[[File:Reddit.jpg|50px|link=https://www.reddit.com/r/Whonix]]
[[File:Diaspora.png|50px|link=https://diasp.org/u/whonix]]
[[File:Gnusocial.png|50px|link=https://gnusocial.cc/whonix]]
[[File:Mewe.png|50px|link=https://mewe.com/i/whonixanonymousos]]
[[File:500px-Tumblr Wordmark.svg.png|50px|link=https://whonix.tumblr.com/]]
[[File:Iconfinder youtube 317714.png|50px|link=https://www.youtube.com/user/adrelanos]]
[[File:200px-Minds logo.svg.png|50px|link=https://www.minds.com/Whonix]]
[[File:200px-Mastodon Logotype (Simple).svg.png|50px|link=https://mastodon.technology/@whonix]]
[[File:200px-LinkedIn Logo 2013.svg.png|50px|link=https://www.linkedin.com/company/whonix]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of Whonix Website and Whonix Chat]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>fixver4pff79vqb7dszbtw9cczisfte</sha1>
    </revision>
    <revision>
      <id>58330</id>
      <parentid>58322</parentid>
      <timestamp>2020-06-26T16:51:58Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>58330</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="4373" sha1="i3p9h7ms3c3ll2zr3ggsewp70n19fv4" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}}

&lt;hr&gt;
[[Official_Whonix_Online_Profiles|Follow]]:
[[File:twitter.png|50px|link=https://twitter.com/Whonix]]
[[File:facebook.png|50px|link=https://www.facebook.com/Whonix]]
[[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]
[[File:Iconfinder news 18421.png|50px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]]
[[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/#whonix:tchncs.de]]
[[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat_No_Media]]
[[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]
[[File:Reddit.jpg|50px|link=https://www.reddit.com/r/Whonix]]
[[File:Diaspora.png|50px|link=https://diasp.org/u/whonix]]
[[File:Gnusocial.png|50px|link=https://gnusocial.cc/whonix]]
[[File:Mewe.png|50px|link=https://mewe.com/i/whonixanonymousos]]
[[File:500px-Tumblr Wordmark.svg.png|50px|link=https://whonix.tumblr.com/]]
[[File:Iconfinder youtube 317714.png|50px|link=https://www.youtube.com/user/adrelanos]]
[[File:200px-Minds logo.svg.png|50px|link=https://www.minds.com/Whonix]]
[[File:200px-Mastodon Logotype (Simple).svg.png|50px|link=https://mastodon.technology/@whonix]]
[[File:200px-LinkedIn Logo 2013.svg.png|50px|link=https://www.linkedin.com/company/whonix]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of Whonix Website and Whonix Chat]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>i3p9h7ms3c3ll2zr3ggsewp70n19fv4</sha1>
    </revision>
    <revision>
      <id>59033</id>
      <parentid>58330</parentid>
      <timestamp>2020-08-05T16:16:13Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>59033</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="4419" sha1="tt0qynp6xcilg3ta7sv3rmufqrrsflr" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}}

&lt;hr&gt;
[[Official_Whonix_Online_Profiles|Follow]]:
[[File:twitter.png|50px|link=https://twitter.com/Whonix]]
[[File:facebook.png|50px|link=https://www.facebook.com/Whonix]]
[[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]
[[File:Iconfinder news 18421.png|50px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]]
[[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/#whonix:tchncs.de]]
[[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat_No_Media]]
[[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]
[[File:Reddit.jpg|50px|link=https://www.reddit.com/r/Whonix]]
[[File:Diaspora.png|50px|link=https://diasp.org/u/whonix]]
[[File:Gnusocial.png|50px|link=https://gnusocial.cc/whonix]]
[[File:Mewe.png|50px|link=https://mewe.com/i/whonixanonymousos]]
[[File:500px-Tumblr Wordmark.svg.png|50px|link=https://whonix.tumblr.com/]]
[[File:Iconfinder youtube 317714.png|50px|link=https://www.youtube.com/user/adrelanos]]
[[File:200px-Minds logo.svg.png|50px|link=https://www.minds.com/Whonix]]
[[File:200px-Mastodon Logotype (Simple).svg.png|50px|link=https://mastodon.technology/@whonix]]
[[File:200px-LinkedIn Logo 2013.svg.png|50px|link=https://www.linkedin.com/company/whonix]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of Whonix Website and Whonix Chat]] applies. [[Policy On Nonfreedom Software]] is a draft.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>tt0qynp6xcilg3ta7sv3rmufqrrsflr</sha1>
    </revision>
    <revision>
      <id>59061</id>
      <parentid>59033</parentid>
      <timestamp>2020-08-06T18:26:41Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>59061</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="4411" sha1="qihb2vt7bemobperzbc770fikh6ltek" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}}

&lt;hr&gt;
[[Official_Whonix_Online_Profiles|Follow]]:
[[File:twitter.png|50px|link=https://twitter.com/Whonix]]
[[File:facebook.png|50px|link=https://www.facebook.com/Whonix]]
[[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]
[[File:Iconfinder news 18421.png|50px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]]
[[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/#whonix:tchncs.de]]
[[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat_No_Media]]
[[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]
[[File:Reddit.jpg|50px|link=https://www.reddit.com/r/Whonix]]
[[File:Diaspora.png|50px|link=https://diasp.org/u/whonix]]
[[File:Gnusocial.png|50px|link=https://gnusocial.cc/whonix]]
[[File:Mewe.png|50px|link=https://mewe.com/i/whonixanonymousos]]
[[File:500px-Tumblr Wordmark.svg.png|50px|link=https://whonix.tumblr.com/]]
[[File:Iconfinder youtube 317714.png|50px|link=https://www.youtube.com/user/adrelanos]]
[[File:200px-Minds logo.svg.png|50px|link=https://www.minds.com/Whonix]]
[[File:200px-Mastodon Logotype (Simple).svg.png|50px|link=https://mastodon.technology/@whonix]]
[[File:200px-LinkedIn Logo 2013.svg.png|50px|link=https://www.linkedin.com/company/whonix]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of Whonix Website and Whonix Chat]] and [[Policy On Nonfreedom Software]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>qihb2vt7bemobperzbc770fikh6ltek</sha1>
    </revision>
    <revision>
      <id>59242</id>
      <parentid>59061</parentid>
      <timestamp>2020-08-18T16:29:21Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>59242</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="4454" sha1="lwl9g5gdwtsmzpxx2hnwkpcy62ioeal" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_Whonix_Online_Profiles|Follow]]:
[[File:twitter.png|50px|link=https://twitter.com/Whonix]]
[[File:facebook.png|50px|link=https://www.facebook.com/Whonix]]
[[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]
[[File:Iconfinder news 18421.png|50px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]]
[[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/#whonix:tchncs.de]]
[[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat_No_Media]]
[[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]
[[File:Reddit.jpg|50px|link=https://www.reddit.com/r/Whonix]]
[[File:Diaspora.png|50px|link=https://diasp.org/u/whonix]]
[[File:Gnusocial.png|50px|link=https://gnusocial.cc/whonix]]
[[File:Mewe.png|50px|link=https://mewe.com/i/whonixanonymousos]]
[[File:500px-Tumblr Wordmark.svg.png|50px|link=https://whonix.tumblr.com/]]
[[File:Iconfinder youtube 317714.png|50px|link=https://www.youtube.com/user/adrelanos]]
[[File:200px-Minds logo.svg.png|50px|link=https://www.minds.com/Whonix]]
[[File:200px-Mastodon Logotype (Simple).svg.png|50px|link=https://mastodon.technology/@whonix]]
[[File:200px-LinkedIn Logo 2013.svg.png|50px|link=https://www.linkedin.com/company/whonix]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of Whonix Website and Whonix Chat]] and [[Policy On Nonfreedom Software]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>lwl9g5gdwtsmzpxx2hnwkpcy62ioeal</sha1>
    </revision>
    <revision>
      <id>59497</id>
      <parentid>59242</parentid>
      <timestamp>2020-09-07T13:22:57Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>59497</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="4582" sha1="tivg42pltb4z9ksl6wb3oi3dkpib2x6" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;
[[File:Jobble.png|link=https://jooble.org/|text=Jobs in USA]]&lt;br /&gt;
{{link|link=https://search.yacy.net|text=Jobs in USA}}
&lt;hr&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_Whonix_Online_Profiles|Follow]]:
[[File:twitter.png|50px|link=https://twitter.com/Whonix]]
[[File:facebook.png|50px|link=https://www.facebook.com/Whonix]]
[[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]
[[File:Iconfinder news 18421.png|50px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]]
[[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/#whonix:tchncs.de]]
[[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat_No_Media]]
[[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]
[[File:Reddit.jpg|50px|link=https://www.reddit.com/r/Whonix]]
[[File:Diaspora.png|50px|link=https://diasp.org/u/whonix]]
[[File:Gnusocial.png|50px|link=https://gnusocial.cc/whonix]]
[[File:Mewe.png|50px|link=https://mewe.com/i/whonixanonymousos]]
[[File:500px-Tumblr Wordmark.svg.png|50px|link=https://whonix.tumblr.com/]]
[[File:Iconfinder youtube 317714.png|50px|link=https://www.youtube.com/user/adrelanos]]
[[File:200px-Minds logo.svg.png|50px|link=https://www.minds.com/Whonix]]
[[File:200px-Mastodon Logotype (Simple).svg.png|50px|link=https://mastodon.technology/@whonix]]
[[File:200px-LinkedIn Logo 2013.svg.png|50px|link=https://www.linkedin.com/company/whonix]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of Whonix Website and Whonix Chat]] and [[Policy On Nonfreedom Software]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>tivg42pltb4z9ksl6wb3oi3dkpib2x6</sha1>
    </revision>
    <revision>
      <id>59502</id>
      <parentid>59497</parentid>
      <timestamp>2020-09-07T21:28:46Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>59502</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="4576" sha1="scjh1p1mnkmwrqs9pe738zae467nlju" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;
[[File:Jobble.png|link=https://jooble.org|text=Jobs in USA]]&lt;br /&gt;
{{link|link=https://jooble.org|text=Jobs in USA}}
&lt;hr&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_Whonix_Online_Profiles|Follow]]:
[[File:twitter.png|50px|link=https://twitter.com/Whonix]]
[[File:facebook.png|50px|link=https://www.facebook.com/Whonix]]
[[File:1280px-Gab_text_logo.svg.png|50px|link=https://gab.com/Whonix]]
[[File:Iconfinder news 18421.png|50px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]]
[[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/#whonix:tchncs.de]]
[[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat_No_Media]]
[[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]
[[File:Reddit.jpg|50px|link=https://www.reddit.com/r/Whonix]]
[[File:Diaspora.png|50px|link=https://diasp.org/u/whonix]]
[[File:Gnusocial.png|50px|link=https://gnusocial.cc/whonix]]
[[File:Mewe.png|50px|link=https://mewe.com/i/whonixanonymousos]]
[[File:500px-Tumblr Wordmark.svg.png|50px|link=https://whonix.tumblr.com/]]
[[File:Iconfinder youtube 317714.png|50px|link=https://www.youtube.com/user/adrelanos]]
[[File:200px-Minds logo.svg.png|50px|link=https://www.minds.com/Whonix]]
[[File:200px-Mastodon Logotype (Simple).svg.png|50px|link=https://mastodon.technology/@whonix]]
[[File:200px-LinkedIn Logo 2013.svg.png|50px|link=https://www.linkedin.com/company/whonix]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of Whonix Website and Whonix Chat]] and [[Policy On Nonfreedom Software]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>scjh1p1mnkmwrqs9pe738zae467nlju</sha1>
    </revision>
    <revision>
      <id>60559</id>
      <parentid>59502</parentid>
      <timestamp>2020-10-24T08:29:17Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>https://www.whonix.org/wiki/Official_Whonix_Online_Profiles#Selection_of_Platforms</comment>
      <origin>60559</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3895" sha1="cbdml4v75eonjgh8ggdhbu5bewv5x4x" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;
[[File:Jobble.png|link=https://jooble.org|text=Jobs in USA]]&lt;br /&gt;
{{link|link=https://jooble.org|text=Jobs in USA}}
&lt;hr&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_Whonix_Online_Profiles|Follow]]:
[[File:twitter.png|50px|link=https://twitter.com/Whonix]]
[[File:facebook.png|50px|link=https://www.facebook.com/Whonix]]
[[File:Iconfinder news 18421.png|50px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|50px|link=https://forums.whonix.org/c/news.rss]]
[[File:Matrix_logo.svg.png|50px|link=https://matrix.to/#/#whonix:tchncs.de]]
[[File:1024px-Telegram_2019_Logo.svg.png|50px|link=https://t.me/Whonix_Chat_No_Media]]
[[File:Discourse_logo.svg|50px|link=https://forums.whonix.org]]
[[File:Reddit.jpg|50px|link=https://www.reddit.com/r/Whonix]]

[[Donate]]: [[File:Donate.png|50px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|50px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|50px]] [[File:BC_Logo_.png|50px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|50px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|50px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of Whonix Website and Whonix Chat]] and [[Policy On Nonfreedom Software]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>cbdml4v75eonjgh8ggdhbu5bewv5x4x</sha1>
    </revision>
    <revision>
      <id>60583</id>
      <parentid>60559</parentid>
      <timestamp>2020-10-26T18:46:30Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>60583</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3895" sha1="qkh5gy6k36iy79e3lhcw8c86k4ydu1t" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;
[[File:Jobble.png|link=https://jooble.org|text=Jobs in USA]]&lt;br /&gt;
{{link|link=https://jooble.org|text=Jobs in USA}}
&lt;hr&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_Whonix_Online_Profiles|Follow]]:
[[File:twitter.png|25px|link=https://twitter.com/Whonix]]
[[File:facebook.png|25px|link=https://www.facebook.com/Whonix]]
[[File:Iconfinder news 18421.png|25px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|25px|link=https://forums.whonix.org/c/news.rss]]
[[File:Matrix_logo.svg.png|25px|link=https://matrix.to/#/#whonix:tchncs.de]]
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/Whonix_Chat_No_Media]]
[[File:Discourse_logo.svg|25px|link=https://forums.whonix.org]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/Whonix]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of Whonix Website and Whonix Chat]] and [[Policy On Nonfreedom Software]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>qkh5gy6k36iy79e3lhcw8c86k4ydu1t</sha1>
    </revision>
    <revision>
      <id>60588</id>
      <parentid>60583</parentid>
      <timestamp>2020-10-27T10:47:00Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>60588</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3991" sha1="tdmt7arox4abyyszrsgbteifz1tjgo9" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;
[[File:Jobble.png|link=https://jooble.org|text=Jobs in USA]]&lt;br /&gt;
{{link|link=https://jooble.org|text=Jobs in USA}}
&lt;hr&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_Whonix_Online_Profiles|Follow]]:
[[File:twitter.png|25px|link=https://twitter.com/Whonix]]
[[File:facebook.png|25px|link=https://www.facebook.com/Whonix]]
[[File:Iconfinder news 18421.png|25px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|25px|link=https://forums.whonix.org/c/news.rss]]
[[File:Matrix_logo.svg.png|25px|link=https://matrix.to/#/#whonix:tchncs.de]]
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/Whonix_Chat_No_Media]]
[[File:Discourse_logo.svg|25px|link=https://forums.whonix.org]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/Whonix]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@whonix]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.svg|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of Whonix Website and Whonix Chat]] and [[Policy On Nonfreedom Software]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>tdmt7arox4abyyszrsgbteifz1tjgo9</sha1>
    </revision>
    <revision>
      <id>60805</id>
      <parentid>60588</parentid>
      <timestamp>2020-11-23T10:38:23Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>60805</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3991" sha1="92viwnvkauc5ylrxhziec56rj6s7xpr" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;
[[File:Jobble.png|link=https://jooble.org|text=Jobs in USA]]&lt;br /&gt;
{{link|link=https://jooble.org|text=Jobs in USA}}
&lt;hr&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_Whonix_Online_Profiles|Follow]]:
[[File:twitter.png|25px|link=https://twitter.com/Whonix]]
[[File:facebook.png|25px|link=https://www.facebook.com/Whonix]]
[[File:Iconfinder news 18421.png|25px|link=https://mailman.whonix.org/postorius/lists/whonix-newsletter.mailman.whonix.org/]] [[File:rss.png|25px|link=https://forums.whonix.org/c/news.rss]]
[[File:Matrix_logo.svg.png|25px|link=https://matrix.to/#/#whonix:tchncs.de]]
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/Whonix_Chat_No_Media]]
[[File:Discourse_logo.svg|25px|link=https://forums.whonix.org]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/Whonix]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@whonix]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contriute|link=Contribute|Contribute]]

[[File:Whonix_donate_bitcoin.png|100px]] [[File:Monero donate whonix.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

[[Official_Whonix_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of Whonix Website and Whonix Chat]] and [[Policy On Nonfreedom Software]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>92viwnvkauc5ylrxhziec56rj6s7xpr</sha1>
    </revision>
    <revision>
      <id>60807</id>
      <parentid>60805</parentid>
      <timestamp>2020-11-23T10:45:15Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>60807</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="4099" sha1="rgsvwsqxeurhc30gfxhnd3x3ftdv91e" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{project name}} is {{#widget:Advertisement}}
&lt;/div&gt;
&lt;hr&gt;
[[File:Jobble.png|link=https://jooble.org|text=Jobs in USA]]&lt;br /&gt;
{{link|link=https://jooble.org|text=Jobs in USA}}
&lt;hr&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_{{project_name_short}}_Online_Profiles|Follow]]:
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Matrix_logo.svg.png|25px|link=https://matrix.to/#/#{{project_name_short}}:{{project_matrix_server}}]]
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/{{project_name_short}}_Chat_No_Media]]
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contriute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

[[Official_{{project_name_short}}_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of {{project_name_short}} Website and {{project_name_short}} Chat]] and [[Policy On Nonfreedom Software]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>rgsvwsqxeurhc30gfxhnd3x3ftdv91e</sha1>
    </revision>
    <revision>
      <id>60817</id>
      <parentid>60807</parentid>
      <timestamp>2020-11-23T10:56:44Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>60817</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3963" sha1="fbuglzpsw2nz8eckq7et8m2rfwcubrn" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_{{project_name_short}}_Online_Profiles|Follow]]:
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Matrix_logo.svg.png|25px|link=https://matrix.to/#/#{{project_name_short}}:{{project_matrix_server}}]]
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/{{project_name_short}}_Chat_No_Media]]
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contriute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

[[Official_{{project_name_short}}_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of {{project_name_short}} Website and {{project_name_short}} Chat]] and [[Policy On Nonfreedom Software]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>fbuglzpsw2nz8eckq7et8m2rfwcubrn</sha1>
    </revision>
    <revision>
      <id>61043</id>
      <parentid>60817</parentid>
      <timestamp>2020-11-29T15:31:28Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>61043</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="4067" sha1="1cgedmxuetpe8oz13nc6hokohyzr6oe" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_{{project_name_short}}_Online_Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/{{project_name_short}}_Chat_No_Media]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/Whonix_All_News]]
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]
[[File:Matrix_logo.svg.png|25px|link=https://matrix.to/#/#{{project_name_short}}:{{project_matrix_server}}]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contriute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

[[Official_{{project_name_short}}_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of {{project_name_short}} Website and {{project_name_short}} Chat]] and [[Policy On Nonfreedom Software]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>1cgedmxuetpe8oz13nc6hokohyzr6oe</sha1>
    </revision>
    <revision>
      <id>61044</id>
      <parentid>61043</parentid>
      <timestamp>2020-11-29T15:32:19Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>61044</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="4067" sha1="foz8q5wq456f6tdev9iam2fe87i62da" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_{{project_name_short}}_Online_Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/Whonix_All_News]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/{{project_name_short}}_Chat_No_Media]]
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]
[[File:Matrix_logo.svg.png|25px|link=https://matrix.to/#/#{{project_name_short}}:{{project_matrix_server}}]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contriute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

[[Official_{{project_name_short}}_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of {{project_name_short}} Website and {{project_name_short}} Chat]] and [[Policy On Nonfreedom Software]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>foz8q5wq456f6tdev9iam2fe87i62da</sha1>
    </revision>
    <revision>
      <id>61045</id>
      <parentid>61044</parentid>
      <timestamp>2020-11-29T15:34:33Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>61045</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="4083" sha1="ftp63tqy2fhyos94o7buttvxmfz1fgw" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_{{project_name_short}}_Online_Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/{{project_name_short}}_All_News]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/{{project_name_short}}_Chat_No_Media]]
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]
[[File:Matrix_logo.svg.png|25px|link=https://matrix.to/#/#{{project_name_short}}:{{project_matrix_server}}]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contriute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

[[Official_{{project_name_short}}_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of {{project_name_short}} Website and {{project_name_short}} Chat]] and [[Policy On Nonfreedom Software]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>ftp63tqy2fhyos94o7buttvxmfz1fgw</sha1>
    </revision>
    <revision>
      <id>61048</id>
      <parentid>61045</parentid>
      <timestamp>2020-11-29T15:59:06Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>61048</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="4289" sha1="rxb5ty8krzzwcth7jxfuloehj1qb3us" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_{{project_name_short}}_Online_Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/{{project_name_short_lowercase}}_All_News]]
[[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/{{project_name_short}}_Chat_No_Media]]
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]
[[File:Matrix_logo.svg.png|25px|link=https://matrix.to/#/#{{project_name_short}}:{{project_matrix_server}}]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contriute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

[[Official_{{project_name_short}}_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of {{project_name_short}} Website and {{project_name_short}} Chat]] and [[Policy On Nonfreedom Software]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>rxb5ty8krzzwcth7jxfuloehj1qb3us</sha1>
    </revision>
    <revision>
      <id>61161</id>
      <parentid>61048</parentid>
      <timestamp>2020-12-03T10:01:35Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>61161</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="4279" sha1="i9dlhvbz9zr6o68w8y5xgbiw9qdtmee" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_{{project_name_short}}_Online_Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/{{project_name_short}}_All_News]]
[[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/{{project_name_short}}_Chat_No_Media]]
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]
[[File:Matrix_logo.svg.png|25px|link=https://matrix.to/#/#{{project_name_short}}:{{project_matrix_server}}]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contriute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

[[Official_{{project_name_short}}_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project name short}}.org{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of {{project_name_short}} Website and {{project_name_short}} Chat]] and [[Policy On Nonfreedom Software]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>i9dlhvbz9zr6o68w8y5xgbiw9qdtmee</sha1>
    </revision>
    <revision>
      <id>61182</id>
      <parentid>61161</parentid>
      <timestamp>2020-12-05T16:30:09Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>61182</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="4273" sha1="74z1shf92vkcstlagvb7127yjzoyxw8" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_{{project_name_short}}_Online_Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/{{project_name_short}}_All_News]]
[[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/{{project_name_short}}_Chat_No_Media]]
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]
[[File:Matrix_logo.svg.png|25px|link=https://matrix.to/#/#{{project_name_short}}:{{project_matrix_server}}]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contriute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

[[Official_{{project_name_short}}_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of {{project_name_short}} Website and {{project_name_short}} Chat]] and [[Policy On Nonfreedom Software]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>74z1shf92vkcstlagvb7127yjzoyxw8</sha1>
    </revision>
    <revision>
      <id>62512</id>
      <parentid>61182</parentid>
      <timestamp>2021-02-09T12:22:04Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>62512</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="4291" sha1="8umy0y3axhks455szyv4fwa86wapx3r" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_{{project_name_short}}_Online_Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/{{project_name_short}}_All_News]]
[[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

Share: {{Share}}

[[Support|Support]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/{{project_name_short}}_Chat_No_Media]]
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]
[[File:Matrix_logo.svg.png|25px|link=https://matrix.to/#/#{{project_name_short}}:{{project_matrix_server}}]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contriute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

[[Official_{{project_name_short}}_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of {{project_name_short}} Website and {{project_name_short}} Chat]] and [[Policy On Nonfreedom Software]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>8umy0y3axhks455szyv4fwa86wapx3r</sha1>
    </revision>
    <revision>
      <id>62516</id>
      <parentid>62512</parentid>
      <timestamp>2021-02-09T12:29:16Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>62516</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="4284" sha1="2ujqin6ypcfh2dfp0tjqcvliu1wrkui" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_{{project_name_short}}_Online_Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/{{project_name_short}}_All_News]]
[[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

{{Share}}

[[Support|Support]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/{{project_name_short}}_Chat_No_Media]]
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]
[[File:Matrix_logo.svg.png|25px|link=https://matrix.to/#/#{{project_name_short}}:{{project_matrix_server}}]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contriute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

[[Official_{{project_name_short}}_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of {{project_name_short}} Website and {{project_name_short}} Chat]] and [[Policy On Nonfreedom Software]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>2ujqin6ypcfh2dfp0tjqcvliu1wrkui</sha1>
    </revision>
    <revision>
      <id>62517</id>
      <parentid>62516</parentid>
      <timestamp>2021-02-09T12:29:41Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>62517</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="4273" sha1="74z1shf92vkcstlagvb7127yjzoyxw8" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_{{project_name_short}}_Online_Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/{{project_name_short}}_All_News]]
[[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/{{project_name_short}}_Chat_No_Media]]
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]
[[File:Matrix_logo.svg.png|25px|link=https://matrix.to/#/#{{project_name_short}}:{{project_matrix_server}}]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contriute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

[[Official_{{project_name_short}}_Online_Profiles|Share]]: {{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of {{project_name_short}} Website and {{project_name_short}} Chat]] and [[Policy On Nonfreedom Software]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>74z1shf92vkcstlagvb7127yjzoyxw8</sha1>
    </revision>
    <revision>
      <id>62518</id>
      <parentid>62517</parentid>
      <timestamp>2021-02-09T12:30:40Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>62518</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="4214" sha1="tdo1zayagahl2d6opa99h1o6dggdu4w" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_{{project_name_short}}_Online_Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/{{project_name_short}}_All_News]]
[[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/{{project_name_short}}_Chat_No_Media]]
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]
[[File:Matrix_logo.svg.png|25px|link=https://matrix.to/#/#{{project_name_short}}:{{project_matrix_server}}]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contriute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of {{project_name_short}} Website and {{project_name_short}} Chat]] and [[Policy On Nonfreedom Software]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>tdo1zayagahl2d6opa99h1o6dggdu4w</sha1>
    </revision>
    <revision>
      <id>62632</id>
      <parentid>62518</parentid>
      <timestamp>2021-02-21T09:49:28Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>62632</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="4216" sha1="ney4pnfk7wmt8f568hxum8rv0cazkee" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_{{project_name_short}}_Online_Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]]
[[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/{{project_name_short}}_Chat_No_Media]]
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]
[[File:Matrix_logo.svg.png|25px|link=https://matrix.to/#/#{{project_name_short}}:{{project_matrix_server}}]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contriute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of {{project_name_short}} Website and {{project_name_short}} Chat]] and [[Policy On Nonfreedom Software]] applies.

Copyright (C) 2012 - 2020 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>ney4pnfk7wmt8f568hxum8rv0cazkee</sha1>
    </revision>
    <revision>
      <id>63932</id>
      <parentid>62632</parentid>
      <timestamp>2021-03-29T19:48:37Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>63932</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="4216" sha1="5zcg7ctxb757ytriyuqbtde38ob3x61" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_{{project_name_short}}_Online_Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]]
[[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/{{project_name_short}}_Chat_No_Media]]
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]
[[File:Matrix_logo.svg.png|25px|link=https://matrix.to/#/#{{project_name_short}}:{{project_matrix_server}}]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contriute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of {{project_name_short}} Website and {{project_name_short}} Chat]] and [[Policy On Nonfreedom Software]] applies.

Copyright (C) 2012 - 2021 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>5zcg7ctxb757ytriyuqbtde38ob3x61</sha1>
    </revision>
    <revision>
      <id>64351</id>
      <parentid>63932</parentid>
      <timestamp>2021-04-08T19:39:33Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>64351</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="4228" sha1="lrjefm31o65enoxywa80q2tlur99mb5" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_{{project_name_short}}_Online_Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]]
[[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/{{project_name_short}}_Chat_No_Media]]
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]
[[File:Matrix_logo.svg.png|25px|link=https://matrix.to/#/#{{project_name_short}}:{{project_matrix_server}}]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contriute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of {{project_name_short}} Website and {{project_name_short}} Chat]] and [[Policy On Nonfreedom Software]] applies.

Copyright (C) 2012 - 2021 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{Admins}}

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>lrjefm31o65enoxywa80q2tlur99mb5</sha1>
    </revision>
    <revision>
      <id>65815</id>
      <parentid>64351</parentid>
      <timestamp>2021-06-05T01:42:17Z</timestamp>
      <contributor>
        <username>Buffy</username>
        <id>4651</id>
      </contributor>
      <minor/>
      <comment>Changed protection level for "[[Template:Footer]]" ([Move=Allow only administrators] (indefinite))</comment>
      <origin>64351</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="4228" sha1="lrjefm31o65enoxywa80q2tlur99mb5" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_{{project_name_short}}_Online_Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]]
[[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/{{project_name_short}}_Chat_No_Media]]
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]
[[File:Matrix_logo.svg.png|25px|link=https://matrix.to/#/#{{project_name_short}}:{{project_matrix_server}}]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contriute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of {{project_name_short}} Website and {{project_name_short}} Chat]] and [[Policy On Nonfreedom Software]] applies.

Copyright (C) 2012 - 2021 {{name}}. [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a [https://www.openinventionnetwork.com/licensees.php licensee] of the [https://www.openinventionnetwork.com Open Invention Network]. Unless otherwise noted, the content of this page is [[{{project name short}}:Copyrights|copyrighted]] and licensed under the same Freedom Software [[{{project name short}}:Copyrights#License|license]] as {{project name}} itself. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{Admins}}

{{project name}} is a derivative of and not affiliated with [https://www.debian.org Debian]. [https://www.debian.org/trademark Debian is a registered trademark] owned by [https://www.spi-inc.org/ Software in the Public Interest, Inc].

{{project name}} is produced independently from the Tor[https://2019.www.torproject.org/docs/trademark-faq.html.en ®] anonymity software and carries no guarantee from [https://www.torproject.org The Tor Project] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>lrjefm31o65enoxywa80q2tlur99mb5</sha1>
    </revision>
    <revision>
      <id>66008</id>
      <parentid>65815</parentid>
      <timestamp>2021-06-07T21:03:23Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>66008</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="4203" sha1="3ftn05uqnqgswq5xd1rlxdmoyrf3wqv" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_{{project_name_short}}_Online_Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]]
[[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/{{project_name_short}}_Chat_No_Media]]
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]
[[File:Matrix_logo.svg.png|25px|link=https://matrix.to/#/#{{project_name_short}}:{{project_matrix_server}}]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contriute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of {{project_name_short}} Website and {{project_name_short}} Chat]] and [[Policy On Nonfreedom Software]] applies.

[[{{project name short}}:Copyrights|Copyright (C) software / wiki]]. {{project name}} is Freedom Software / Open Source. ([[Why_{{project name short}}_is_Freedom_Software|Why?]]) [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a {{link|link=https://www.openinventionnetwork.com/licensees.php|text=licensee}} of the {{link|link=https://www.openinventionnetwork.com|text=Open Invention Network}}.

{{Admins}}

{{project name}} is a derivative of and not affiliated with {{link|link=https://www.debian.org|text=Debian}}. {{link|link=https://www.debian.org/trademark|text=Debian is a registered trademark}} owned by {{link|link=https://www.spi-inc.org/|text=Software in the Public Interest, Inc}}.

{{project name}} is produced independently from the Tor{{link|link=https://2019.www.torproject.org/docs/trademark-faq.html.en|text=®}} anonymity software and carries no guarantee from {{link|link=https://www.torproject.org|text=The Tor Project}} about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>3ftn05uqnqgswq5xd1rlxdmoyrf3wqv</sha1>
    </revision>
    <revision>
      <id>66009</id>
      <parentid>66008</parentid>
      <timestamp>2021-06-07T21:14:31Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>66009</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="4246" sha1="huvsz9mokfrs0f1lrtvu2mt8job3g16" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_{{project_name_short}}_Online_Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]]
[[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/{{project_name_short}}_Chat_No_Media]]
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]
[[File:Matrix_logo.svg.png|25px|link=https://matrix.to/#/#{{project_name_short}}:{{project_matrix_server}}]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contriute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to [[{{project name short}}:Copyrights#Conditions_for_Contributions_to_{{project name}}|Conditions for Contributions to {{project name}}]], then {{Edit_it}}! Edits are held for moderation. [[Policy of {{project_name_short}} Website and {{project_name_short}} Chat]] and [[Policy On Nonfreedom Software]] applies.

[[{{project name short}}:Copyrights|Copyright (C) software]] / [[{{project name short}}:Copyrights#Wiki|wiki]]. {{project name}} is Freedom Software / Open Source. ([[Why_{{project name short}}_is_Freedom_Software|Why?]]) [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a {{link|link=https://www.openinventionnetwork.com/licensees.php|text=licensee}} of the {{link|link=https://www.openinventionnetwork.com|text=Open Invention Network}}.

{{Admins}}

{{project name}} is a derivative of and not affiliated with {{link|link=https://www.debian.org|text=Debian}}. {{link|link=https://www.debian.org/trademark|text=Debian is a registered trademark}} owned by {{link|link=https://www.spi-inc.org/|text=Software in the Public Interest, Inc}}.

{{project name}} is produced independently from the Tor{{link|link=https://2019.www.torproject.org/docs/trademark-faq.html.en|text=®}} anonymity software and carries no guarantee from {{link|link=https://www.torproject.org|text=The Tor Project}} about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>huvsz9mokfrs0f1lrtvu2mt8job3g16</sha1>
    </revision>
    <revision>
      <id>66120</id>
      <parentid>66009</parentid>
      <timestamp>2021-06-17T21:29:03Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>https://forums.whonix.org/t/long-wiki-edits-thread/3477/2043</comment>
      <origin>66120</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3794" sha1="909zdjam54phtnmq6hhknplrcudw0nc" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_{{project_name_short}}_Online_Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]]
[[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/{{project_name_short}}_Chat_No_Media]]
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]
[[File:Matrix_logo.svg.png|25px|link=https://matrix.to/#/#{{project_name_short}}:{{project_matrix_server}}]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contriute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
[[{{project name short}}:Copyrights|Copyright (C) software]] / [[{{project name short}}:Copyrights#Wiki|wiki]]. {{project name}} is Freedom Software / Open Source. ([[Why_{{project name short}}_is_Freedom_Software|Why?]]) [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a {{link|link=https://www.openinventionnetwork.com/licensees.php|text=licensee}} of the {{link|link=https://www.openinventionnetwork.com|text=Open Invention Network}}.

{{Admins}}

{{project name}} is a derivative of and not affiliated with {{link|link=https://www.debian.org|text=Debian}}. {{link|link=https://www.debian.org/trademark|text=Debian is a registered trademark}} owned by {{link|link=https://www.spi-inc.org/|text=Software in the Public Interest, Inc}}.

{{project name}} is produced independently from the Tor{{link|link=https://2019.www.torproject.org/docs/trademark-faq.html.en|text=®}} anonymity software and carries no guarantee from {{link|link=https://www.torproject.org|text=The Tor Project}} about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>909zdjam54phtnmq6hhknplrcudw0nc</sha1>
    </revision>
    <revision>
      <id>66121</id>
      <parentid>66120</parentid>
      <timestamp>2021-06-17T21:39:53Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>https://forums.whonix.org/t/long-wiki-edits-thread/3477/2044</comment>
      <origin>66121</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3214" sha1="gtgkh7nnd7q0c5bjzdnv975onb7px0x" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_{{project_name_short}}_Online_Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]]
[[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/{{project_name_short}}_Chat_No_Media]]
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]
[[File:Matrix_logo.svg.png|25px|link=https://matrix.to/#/#{{project_name_short}}:{{project_matrix_server}}]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contriute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
[[{{project name short}}:Copyrights|Copyright (C) software]] / [[{{project name short}}:Copyrights#Wiki|wiki]]. {{project name}} is Freedom Software / Open Source. ([[Why_{{project name short}}_is_Freedom_Software|Why?]]) [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]] {{project name}} is a {{link|link=https://www.openinventionnetwork.com/licensees.php|text=licensee}} of the {{link|link=https://www.openinventionnetwork.com|text=Open Invention Network}}.

{{Admins}}

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>gtgkh7nnd7q0c5bjzdnv975onb7px0x</sha1>
    </revision>
    <revision>
      <id>66124</id>
      <parentid>66121</parentid>
      <timestamp>2021-06-17T21:44:21Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>moved to https://www.whonix.org/wiki/Whonix:Copyrights#Patents</comment>
      <origin>66124</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3026" sha1="dwksqffqy43icl2dy7o40zsury334u3" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_{{project_name_short}}_Online_Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]]
[[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/{{project_name_short}}_Chat_No_Media]]
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]
[[File:Matrix_logo.svg.png|25px|link=https://matrix.to/#/#{{project_name_short}}:{{project_matrix_server}}]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contriute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
[[{{project name short}}:Copyrights|Copyright (C) software]] / [[{{project name short}}:Copyrights#Wiki|wiki]]. {{project name}} is Freedom Software / Open Source. ([[Why_{{project name short}}_is_Freedom_Software|Why?]]) [[{{project name short}} Trademark Policy|{{project name}} is a trademark.]]

{{Admins}}

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>dwksqffqy43icl2dy7o40zsury334u3</sha1>
    </revision>
    <revision>
      <id>66126</id>
      <parentid>66124</parentid>
      <timestamp>2021-06-17T21:49:00Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>moved to https://www.whonix.org/wiki/Whonix:Copyrights#Trademark</comment>
      <origin>66126</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3020" sha1="ggrlj4v5sjf4pfnjg5xqdiu8vg7uhio" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_{{project_name_short}}_Online_Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]]
[[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/{{project_name_short}}_Chat_No_Media]]
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]
[[File:Matrix_logo.svg.png|25px|link=https://matrix.to/#/#{{project_name_short}}:{{project_matrix_server}}]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contriute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]]

&lt;font size="-1"&gt;
{{project name short}} [[{{project name short}} Trademark Policy|™]] Copyright [[{{project name short}}:Copyrights|(C) software]] / [[{{project name short}}:Copyrights#Wiki|wiki]]. {{project name}} is Freedom Software / Open Source. ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{Admins}}

By using our website, you acknowledge that you have read, understood and agreed to our [[Privacy Policy]], [[Cookie Policy]], [[Terms of Service]], and [[E-Sign Consent]]. {{project name}} is provided by {{name}}. See [[Impressum|Imprint]], [[Contact|Contact]].
&lt;/font&gt;</text>
      <sha1>ggrlj4v5sjf4pfnjg5xqdiu8vg7uhio</sha1>
    </revision>
    <revision>
      <id>66189</id>
      <parentid>66126</parentid>
      <timestamp>2021-06-23T13:55:43Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>66189</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2740" sha1="i0dfggywfkg9t5iyips20ebgfodr5vx" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_{{project_name_short}}_Online_Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]]
[[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/{{project_name_short}}_Chat_No_Media]]
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]
[[File:Matrix_logo.svg.png|25px|link=https://matrix.to/#/#{{project_name_short}}:{{project_matrix_server}}]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contriute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project name short}} [[{{project name short}} Trademark Policy|™]] | [[{{project name short}}:Copyrights|©]] {{name}} | Freedom Software / Open Source ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{Admins}}&lt;/font&gt;</text>
      <sha1>i0dfggywfkg9t5iyips20ebgfodr5vx</sha1>
    </revision>
    <revision>
      <id>66219</id>
      <parentid>66189</parentid>
      <timestamp>2021-06-24T22:47:13Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>66219</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2812" sha1="lfiyzgfw3q997d9i2ed0p2930zdhn2j" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_{{project_name_short}}_Online_Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]]
[[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/{{project_name_short}}_Chat_No_Media]]
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]
[[File:Matrix_logo.svg.png|25px|link=https://matrix.to/#/#{{project_name_short}}:{{project_matrix_server}}]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contriute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project name short}} [[{{project name short}} Trademark Policy|™]] | [[{{project name short}}:Copyrights|©]] {{name}} | [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{Admins}}&lt;/font&gt;</text>
      <sha1>lfiyzgfw3q997d9i2ed0p2930zdhn2j</sha1>
    </revision>
    <revision>
      <id>68276</id>
      <parentid>66219</parentid>
      <timestamp>2021-09-29T17:16:48Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>68276</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2600" sha1="iox651ag7wnrls8o54y2yvaryzdhf10" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_{{project_name_short}}_Online_Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]]
[[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contriute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project name short}} [[{{project name short}} Trademark Policy|™]] | [[{{project name short}}:Copyrights|©]] {{name}} | [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{Admins}}&lt;/font&gt;</text>
      <sha1>iox651ag7wnrls8o54y2yvaryzdhf10</sha1>
    </revision>
    <revision>
      <id>70418</id>
      <parentid>68276</parentid>
      <timestamp>2021-11-17T17:14:55Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>70418</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2601" sha1="opcizdxg1a6cb908a2n9ec5t61rqefg" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official_{{project_name_short}}_Online_Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]]
[[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project name short}} [[{{project name short}} Trademark Policy|™]] | [[{{project name short}}:Copyrights|©]] {{name}} | [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{Admins}}&lt;/font&gt;</text>
      <sha1>opcizdxg1a6cb908a2n9ec5t61rqefg</sha1>
    </revision>
    <revision>
      <id>70810</id>
      <parentid>70418</parentid>
      <timestamp>2021-11-22T15:36:41Z</timestamp>
      <contributor>
        <username>Einsiedler90</username>
        <id>4962</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "(?i)\[\[Official.{1,30}Online.Profiles" to "[[Official Project Online Profiles"</comment>
      <origin>70810</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2586" sha1="b8xhc8n6dqq5mbsvckkssxen4x5816x" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official Project Online Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]]
[[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project name short}} [[{{project name short}} Trademark Policy|™]] | [[{{project name short}}:Copyrights|©]] {{name}} | [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{Admins}}&lt;/font&gt;</text>
      <sha1>b8xhc8n6dqq5mbsvckkssxen4x5816x</sha1>
    </revision>
    <revision>
      <id>70905</id>
      <parentid>70810</parentid>
      <timestamp>2021-11-22T18:07:25Z</timestamp>
      <contributor>
        <username>Einsiedler90</username>
        <id>4962</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "(?i)\[\[.{1,30}Trademark.Policy" to "[[Trademark Policy"</comment>
      <origin>70905</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2563" sha1="1k7jeeswbmy2cc6476uezxc2ctx1ant" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official Project Online Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]]
[[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project name short}} [[Trademark Policy|™]] | [[{{project name short}}:Copyrights|©]] {{name}} | [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{Admins}}&lt;/font&gt;</text>
      <sha1>1k7jeeswbmy2cc6476uezxc2ctx1ant</sha1>
    </revision>
    <revision>
      <id>71085</id>
      <parentid>70905</parentid>
      <timestamp>2021-11-23T07:07:03Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "Official Project Online Profiles" to "Official Online Profiles"</comment>
      <origin>71085</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2555" sha1="hese9jgkksd9p9nla77w10wxh5690l2" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official Online Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]]
[[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project name short}} [[Trademark Policy|™]] | [[{{project name short}}:Copyrights|©]] {{name}} | [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Why_{{project name short}}_is_Freedom_Software|Why?]])

{{Admins}}&lt;/font&gt;</text>
      <sha1>hese9jgkksd9p9nla77w10wxh5690l2</sha1>
    </revision>
    <revision>
      <id>71136</id>
      <parentid>71085</parentid>
      <timestamp>2021-11-24T07:12:03Z</timestamp>
      <contributor>
        <username>Einsiedler90</username>
        <id>4962</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "(?i)\[\[Why.{1,30}is.Freedom.Software" to "[[Why Project is Freedom Software"</comment>
      <origin>71136</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2540" sha1="c6aw5tt9qeiw5pua1l93b3ftloq1xkt" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official Online Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]]
[[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project name short}} [[Trademark Policy|™]] | [[{{project name short}}:Copyrights|©]] {{name}} | [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Why Project is Freedom Software|Why?]])

{{Admins}}&lt;/font&gt;</text>
      <sha1>c6aw5tt9qeiw5pua1l93b3ftloq1xkt</sha1>
    </revision>
    <revision>
      <id>71185</id>
      <parentid>71136</parentid>
      <timestamp>2021-11-24T12:01:02Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "Why Project is Freedom Software" to "Reasons for Freedom Software"</comment>
      <origin>71185</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2537" sha1="28yulcx2c7skvvu5lnlkf447ndd7h0q" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official Online Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]]
[[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project name short}} [[Trademark Policy|™]] | [[{{project name short}}:Copyrights|©]] {{name}} | [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Reasons for Freedom Software|Why?]])

{{Admins}}&lt;/font&gt;</text>
      <sha1>28yulcx2c7skvvu5lnlkf447ndd7h0q</sha1>
    </revision>
    <revision>
      <id>71757</id>
      <parentid>71185</parentid>
      <timestamp>2021-12-01T09:57:22Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "(?i)\{\{project.name.short\}\}" to "{{project_name_short}}"</comment>
      <origin>71757</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2537" sha1="ms05o1iyz8up622llepwaqtt6h5mfza" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project name}} Wiki]]

&lt;hr&gt;
[[Official Online Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]]
[[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project_name_short}} [[Trademark Policy|™]] | [[{{project_name_short}}:Copyrights|©]] {{name}} | [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Reasons for Freedom Software|Why?]])

{{Admins}}&lt;/font&gt;</text>
      <sha1>ms05o1iyz8up622llepwaqtt6h5mfza</sha1>
    </revision>
    <revision>
      <id>72358</id>
      <parentid>71757</parentid>
      <timestamp>2021-12-01T22:42:27Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "\{\{(\w+)\s(\w+)\}\}" to "{{$1_$2}}"</comment>
      <origin>72358</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2537" sha1="edzm3fwtiz2wsl4et3hw9s9fm32tfyf" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project_name}} Wiki]]

&lt;hr&gt;
[[Official Online Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]]
[[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project_name_short}} [[Trademark Policy|™]] | [[{{project_name_short}}:Copyrights|©]] {{name}} | [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Reasons for Freedom Software|Why?]])

{{Admins}}&lt;/font&gt;</text>
      <sha1>edzm3fwtiz2wsl4et3hw9s9fm32tfyf</sha1>
    </revision>
    <revision>
      <id>73973</id>
      <parentid>72358</parentid>
      <timestamp>2021-12-02T01:08:08Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "{{project_name}}" to "{{project_name_long}}"</comment>
      <origin>73973</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2542" sha1="c0n3afdynjrcfkddp39zbyx0p5hd7zb" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project_name_long}} Wiki]]

&lt;hr&gt;
[[Official Online Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]]
[[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project_name_short}} [[Trademark Policy|™]] | [[{{project_name_short}}:Copyrights|©]] {{name}} | [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Reasons for Freedom Software|Why?]])

{{Admins}}&lt;/font&gt;</text>
      <sha1>c0n3afdynjrcfkddp39zbyx0p5hd7zb</sha1>
    </revision>
    <revision>
      <id>74232</id>
      <parentid>73973</parentid>
      <timestamp>2021-12-09T15:05:36Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>Blanked the page</comment>
      <origin>74232</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="0" sha1="phoiac9h4m842xq45sp7s6u21eteeq1" xml:space="preserve" />
      <sha1>phoiac9h4m842xq45sp7s6u21eteeq1</sha1>
    </revision>
    <revision>
      <id>74246</id>
      <parentid>74232</parentid>
      <timestamp>2021-12-09T16:26:08Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>74246</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2542" sha1="c0n3afdynjrcfkddp39zbyx0p5hd7zb" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project_name_long}} Wiki]]

&lt;hr&gt;
[[Official Online Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]]
[[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project_name_short}} [[Trademark Policy|™]] | [[{{project_name_short}}:Copyrights|©]] {{name}} | [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Reasons for Freedom Software|Why?]])

{{Admins}}&lt;/font&gt;</text>
      <sha1>c0n3afdynjrcfkddp39zbyx0p5hd7zb</sha1>
    </revision>
    <revision>
      <id>74256</id>
      <parentid>74246</parentid>
      <timestamp>2021-12-09T20:02:25Z</timestamp>
      <contributor>
        <username>Buffy</username>
        <id>4651</id>
      </contributor>
      <minor/>
      <comment>Changed protection level for "[[Template:Footer]]": Footer shouldn't be editable by non-administrators ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))</comment>
      <origin>74246</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2542" sha1="c0n3afdynjrcfkddp39zbyx0p5hd7zb" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
{{Advertisement2}}

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project_name_long}} Wiki]]

&lt;hr&gt;
[[Official Online Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]]
[[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
[[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
[[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
[[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
[[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
[[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]

[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project_name_short}} [[Trademark Policy|™]] | [[{{project_name_short}}:Copyrights|©]] {{name}} | [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Reasons for Freedom Software|Why?]])

{{Admins}}&lt;/font&gt;</text>
      <sha1>c0n3afdynjrcfkddp39zbyx0p5hd7zb</sha1>
    </revision>
    <revision>
      <id>74296</id>
      <parentid>74256</parentid>
      <timestamp>2021-12-11T11:39:51Z</timestamp>
      <contributor>
        <username>Admintemp</username>
        <id>5029</id>
      </contributor>
      <origin>74296</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2853" sha1="dy5he8i0aiizrsos6qx2j3pzyjx4f76" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
    {{Advertisement}}
&lt;/div&gt;
&lt;div&gt;
    &lt;div style="display: flex;justify-content: space-between;"&gt;
        &lt;div&gt;

        [[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

        {{Share}}
    &lt;/div&gt;
        &lt;div&gt;
            [[Official Online Profiles|Follow]]:
            [[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]]
            [[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
            [[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
            [[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
            [[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
            [[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
            [[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

            [[Support|Support]]:
            [[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]

            [[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]
        &lt;/div&gt;


            {{Advertisement2}}
    &lt;/div&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project_name_long}} Wiki]]





{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project_name_short}} [[Trademark Policy|™]] | [[{{project_name_short}}:Copyrights|©]] {{name}} |
    [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Reasons
    for Freedom Software|Why?]])

    {{Admins}}&lt;/font&gt;</text>
      <sha1>dy5he8i0aiizrsos6qx2j3pzyjx4f76</sha1>
    </revision>
    <revision>
      <id>74297</id>
      <parentid>74296</parentid>
      <timestamp>2021-12-11T11:48:08Z</timestamp>
      <contributor>
        <username>Admintemp</username>
        <id>5029</id>
      </contributor>
      <origin>74297</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2823" sha1="5hbm9ol7kam585i0bdiim5yvryhmqpr" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
    {{Advertisement}}
&lt;/div&gt;
&lt;div&gt;
    &lt;div style="display: flex;justify-content: space-between;"&gt;
        &lt;div&gt;

        [[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

        {{Share}}
    &lt;/div&gt;
        &lt;div&gt;[[Official Online Profiles|Follow]]:
            [[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]]
            [[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
            [[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
            [[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
            [[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
            [[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
            [[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]
            [[Support|Support]]:
            [[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]
            [[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]
        &lt;/div&gt;{{Advertisement2}}
    &lt;/div&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project_name_long}} Wiki]]





{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project_name_short}} [[Trademark Policy|™]] | [[{{project_name_short}}:Copyrights|©]] {{name}} |
    [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Reasons
    for Freedom Software|Why?]])

    {{Admins}}&lt;/font&gt;</text>
      <sha1>5hbm9ol7kam585i0bdiim5yvryhmqpr</sha1>
    </revision>
    <revision>
      <id>74298</id>
      <parentid>74297</parentid>
      <timestamp>2021-12-11T11:49:56Z</timestamp>
      <contributor>
        <username>Admintemp</username>
        <id>5029</id>
      </contributor>
      <origin>74298</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2825" sha1="gkjtt8s6iiuls974ym316ur6a55j7ri" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
    {{Advertisement}}
&lt;/div&gt;
&lt;div&gt;
    &lt;div style="display: flex;justify-content: space-between;"&gt;
        &lt;div&gt;

        [[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

        {{Share}}
    &lt;/div&gt;
        &lt;div&gt;[[Official Online Profiles|Follow]]:
            [[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]]
            [[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
            [[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
            [[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
            [[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
            [[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
            [[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

            [[Support|Support]]:
            [[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]

            [[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]
        &lt;/div&gt;{{Advertisement2}}
    &lt;/div&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project_name_long}} Wiki]]





{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project_name_short}} [[Trademark Policy|™]] | [[{{project_name_short}}:Copyrights|©]] {{name}} |
    [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Reasons
    for Freedom Software|Why?]])

    {{Admins}}&lt;/font&gt;</text>
      <sha1>gkjtt8s6iiuls974ym316ur6a55j7ri</sha1>
    </revision>
    <revision>
      <id>74300</id>
      <parentid>74298</parentid>
      <timestamp>2021-12-11T11:56:03Z</timestamp>
      <contributor>
        <username>Admintemp</username>
        <id>5029</id>
      </contributor>
      <origin>74300</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="3137" sha1="jkdi2g56xeg3gp5goly9xjblgbr55q7" xml:space="preserve">&lt;style&gt;
div#mw-content-text pre {
    display: block;
    background: inherit;
    font-family: inherit;
    line-height: inherit;
    white-space: inherit;
    margin-bottom: inherit;
    margin: inherit;
    padding: inherit;
    font-size: inherit;
    overflow: inherit;
    box-sizing: inherit;
}
&lt;/style&gt;

&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
    {{Advertisement}}
&lt;/div&gt;
&lt;div&gt;
    &lt;div style="display: flex;justify-content: space-between;"&gt;
        &lt;div&gt;

        [[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

        {{Share}}
    &lt;/div&gt;
        &lt;div&gt;[[Official Online Profiles|Follow]]:
            [[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]]
            [[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
            [[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
            [[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
            [[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
            [[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
            [[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

            [[Support|Support]]:
            [[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]

            [[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]
        &lt;/div&gt;{{Advertisement2}}
    &lt;/div&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project_name_long}} Wiki]]





{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project_name_short}} [[Trademark Policy|™]] | [[{{project_name_short}}:Copyrights|©]] {{name}} |
    [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Reasons
    for Freedom Software|Why?]])

    {{Admins}}&lt;/font&gt;</text>
      <sha1>jkdi2g56xeg3gp5goly9xjblgbr55q7</sha1>
    </revision>
    <revision>
      <id>74301</id>
      <parentid>74300</parentid>
      <timestamp>2021-12-11T11:56:16Z</timestamp>
      <contributor>
        <username>Admintemp</username>
        <id>5029</id>
      </contributor>
      <origin>74301</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2826" sha1="icl38y0qwxbgfzipg0xku8yoyzf9iqz" xml:space="preserve">
&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
    {{Advertisement}}
&lt;/div&gt;
&lt;div&gt;
    &lt;div style="display: flex;justify-content: space-between;"&gt;
        &lt;div&gt;

        [[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

        {{Share}}
    &lt;/div&gt;
        &lt;div&gt;[[Official Online Profiles|Follow]]:
            [[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]]
            [[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
            [[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
            [[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
            [[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
            [[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
            [[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

            [[Support|Support]]:
            [[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]

            [[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]
        &lt;/div&gt;{{Advertisement2}}
    &lt;/div&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project_name_long}} Wiki]]





{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project_name_short}} [[Trademark Policy|™]] | [[{{project_name_short}}:Copyrights|©]] {{name}} |
    [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Reasons
    for Freedom Software|Why?]])

    {{Admins}}&lt;/font&gt;</text>
      <sha1>icl38y0qwxbgfzipg0xku8yoyzf9iqz</sha1>
    </revision>
    <revision>
      <id>74304</id>
      <parentid>74301</parentid>
      <timestamp>2021-12-11T12:07:55Z</timestamp>
      <contributor>
        <username>Admintemp</username>
        <id>5029</id>
      </contributor>
      <origin>74304</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2771" sha1="7y2ngps3skbl4z2q3gobrs9o9o1gr91" xml:space="preserve">
&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
    {{Advertisement}}
&lt;/div&gt;
&lt;div&gt;&lt;div style="display: flex;justify-content: space-between;"&gt;&lt;div&gt;[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}
    &lt;/div&gt;&lt;div&gt;[[Official Online Profiles|Follow]]:
            [[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]]
            [[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]]
            [[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]]
            [[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]]
            [[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]]
            [[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]]
            [[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

            [[Support|Support]]:
            [[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]

            [[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]&lt;/div&gt;{{Advertisement2}}&lt;/div&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project_name_long}} Wiki]]





{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project_name_short}} [[Trademark Policy|™]] | [[{{project_name_short}}:Copyrights|©]] {{name}} |
    [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Reasons
    for Freedom Software|Why?]])

    {{Admins}}&lt;/font&gt;</text>
      <sha1>7y2ngps3skbl4z2q3gobrs9o9o1gr91</sha1>
    </revision>
    <revision>
      <id>74305</id>
      <parentid>74304</parentid>
      <timestamp>2021-12-11T12:09:26Z</timestamp>
      <contributor>
        <username>Admintemp</username>
        <id>5029</id>
      </contributor>
      <origin>74305</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2693" sha1="5dapfuboph0lnahoutqzysi7z1qylgm" xml:space="preserve">
&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
    {{Advertisement}}
&lt;/div&gt;
&lt;div&gt;&lt;div style="display: flex;justify-content: space-between;"&gt;&lt;div&gt;[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}
    &lt;/div&gt;&lt;div&gt;[[Official Online Profiles|Follow]]:
            [[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]][[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]][[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]][[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]][[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]][[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]][[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

            [[Support|Support]]:
            [[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]

            [[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]&lt;/div&gt;{{Advertisement2}}&lt;/div&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project_name_long}} Wiki]]





{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project_name_short}} [[Trademark Policy|™]] | [[{{project_name_short}}:Copyrights|©]] {{name}} |
    [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Reasons
    for Freedom Software|Why?]])

    {{Admins}}&lt;/font&gt;</text>
      <sha1>5dapfuboph0lnahoutqzysi7z1qylgm</sha1>
    </revision>
    <revision>
      <id>74306</id>
      <parentid>74305</parentid>
      <timestamp>2021-12-11T12:09:56Z</timestamp>
      <contributor>
        <username>Admintemp</username>
        <id>5029</id>
      </contributor>
      <origin>74306</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2681" sha1="sultq0236gnpnl0shpmzxbpc80smuco" xml:space="preserve">
&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
    {{Advertisement}}
&lt;/div&gt;
&lt;div&gt;&lt;div style="display: flex;justify-content: space-between;"&gt;&lt;div&gt;[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}
    &lt;/div&gt;&lt;div&gt;[[Official Online Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]][[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]][[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]][[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]][[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]][[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]][[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

            [[Support|Support]]:
            [[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]

            [[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]&lt;/div&gt;{{Advertisement2}}&lt;/div&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project_name_long}} Wiki]]





{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project_name_short}} [[Trademark Policy|™]] | [[{{project_name_short}}:Copyrights|©]] {{name}} |
    [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Reasons
    for Freedom Software|Why?]])

    {{Admins}}&lt;/font&gt;</text>
      <sha1>sultq0236gnpnl0shpmzxbpc80smuco</sha1>
    </revision>
    <revision>
      <id>74307</id>
      <parentid>74306</parentid>
      <timestamp>2021-12-11T12:10:12Z</timestamp>
      <contributor>
        <username>Admintemp</username>
        <id>5029</id>
      </contributor>
      <origin>74307</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2645" sha1="qz5csgcm4kvh13dpthakbhi3t0gr0ij" xml:space="preserve">
&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
    {{Advertisement}}
&lt;/div&gt;
&lt;div&gt;&lt;div style="display: flex;justify-content: space-between;"&gt;&lt;div&gt;[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}
    &lt;/div&gt;&lt;div&gt;[[Official Online Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]][[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]][[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]][[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]][[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]][[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]][[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]&lt;/div&gt;{{Advertisement2}}&lt;/div&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project_name_long}} Wiki]]





{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project_name_short}} [[Trademark Policy|™]] | [[{{project_name_short}}:Copyrights|©]] {{name}} |
    [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Reasons
    for Freedom Software|Why?]])

    {{Admins}}&lt;/font&gt;</text>
      <sha1>qz5csgcm4kvh13dpthakbhi3t0gr0ij</sha1>
    </revision>
    <revision>
      <id>74308</id>
      <parentid>74307</parentid>
      <timestamp>2021-12-11T12:12:27Z</timestamp>
      <contributor>
        <username>Admintemp</username>
        <id>5029</id>
      </contributor>
      <origin>74308</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2670" sha1="1j0920c1nwd54atoz86wu8dkchzn27t" xml:space="preserve">
&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
    {{Advertisement}}
&lt;/div&gt;
&lt;div&gt;&lt;div style="display: flex;justify-content: space-between;" class="footer-row-multi"&gt;&lt;div&gt;[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}
    &lt;/div&gt;&lt;div&gt;[[Official Online Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]][[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]][[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]][[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]][[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]][[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]][[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]&lt;/div&gt;{{Advertisement2}}&lt;/div&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project_name_long}} Wiki]]





{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project_name_short}} [[Trademark Policy|™]] | [[{{project_name_short}}:Copyrights|©]] {{name}} |
    [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Reasons
    for Freedom Software|Why?]])

    {{Admins}}&lt;/font&gt;</text>
      <sha1>1j0920c1nwd54atoz86wu8dkchzn27t</sha1>
    </revision>
    <revision>
      <id>74310</id>
      <parentid>74308</parentid>
      <timestamp>2021-12-11T12:15:28Z</timestamp>
      <contributor>
        <username>Admintemp</username>
        <id>5029</id>
      </contributor>
      <origin>74310</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2666" sha1="5pexjkmpcq4hs4z43anqt0xcwtdqgs4" xml:space="preserve">
&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
    {{Advertisement}}
&lt;/div&gt;
&lt;div&gt;&lt;div style="display: flex;justify-content: space-between;" class="footer-row-multi"&gt;&lt;div&gt;[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}
    &lt;/div&gt;&lt;div&gt;[[Official Online Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]][[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]][[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]][[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]][[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]][[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]][[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]&lt;/div&gt;{{Advertisement2}}&lt;/div&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project_name_long}} Wiki]]

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project_name_short}} [[Trademark Policy|™]] | [[{{project_name_short}}:Copyrights|©]] {{name}} |
    [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Reasons
    for Freedom Software|Why?]])

    {{Admins}}&lt;/font&gt;</text>
      <sha1>5pexjkmpcq4hs4z43anqt0xcwtdqgs4</sha1>
    </revision>
    <revision>
      <id>74311</id>
      <parentid>74310</parentid>
      <timestamp>2021-12-11T12:15:46Z</timestamp>
      <contributor>
        <username>Admintemp</username>
        <id>5029</id>
      </contributor>
      <origin>74311</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2668" sha1="513lf0i83qh6gomi5qmonxzkvbz9nwv" xml:space="preserve">
&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
    {{Advertisement}}
&lt;/div&gt;
&lt;div&gt;

&lt;div style="display: flex;justify-content: space-between;" class="footer-row-multi"&gt;&lt;div&gt;[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}
    &lt;/div&gt;&lt;div&gt;[[Official Online Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]][[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]][[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]][[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]][[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]][[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]][[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]&lt;/div&gt;{{Advertisement2}}&lt;/div&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project_name_long}} Wiki]]

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project_name_short}} [[Trademark Policy|™]] | [[{{project_name_short}}:Copyrights|©]] {{name}} |
    [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Reasons
    for Freedom Software|Why?]])

    {{Admins}}&lt;/font&gt;</text>
      <sha1>513lf0i83qh6gomi5qmonxzkvbz9nwv</sha1>
    </revision>
    <revision>
      <id>74312</id>
      <parentid>74311</parentid>
      <timestamp>2021-12-11T12:15:57Z</timestamp>
      <contributor>
        <username>Admintemp</username>
        <id>5029</id>
      </contributor>
      <origin>74312</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2670" sha1="gwxtalqcd6exnz1kdcssmv0spkwuuxd" xml:space="preserve">
&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
    {{Advertisement}}
&lt;/div&gt;
&lt;div&gt;



&lt;div style="display: flex;justify-content: space-between;" class="footer-row-multi"&gt;&lt;div&gt;[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}
    &lt;/div&gt;&lt;div&gt;[[Official Online Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]][[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]][[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]][[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]][[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]][[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]][[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]&lt;/div&gt;{{Advertisement2}}&lt;/div&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project_name_long}} Wiki]]

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project_name_short}} [[Trademark Policy|™]] | [[{{project_name_short}}:Copyrights|©]] {{name}} |
    [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Reasons
    for Freedom Software|Why?]])

    {{Admins}}&lt;/font&gt;</text>
      <sha1>gwxtalqcd6exnz1kdcssmv0spkwuuxd</sha1>
    </revision>
    <revision>
      <id>74313</id>
      <parentid>74312</parentid>
      <timestamp>2021-12-11T12:19:09Z</timestamp>
      <contributor>
        <username>Admintemp</username>
        <id>5029</id>
      </contributor>
      <origin>74313</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2658" sha1="qu3hqj0btl35femztl98ukerg18qasl" xml:space="preserve">
&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
    {{Advertisement}}
&lt;/div&gt;
&lt;div&gt;



&lt;div style="display: flex;justify-content: space-between;" class="footer-row-multi"&gt;&lt;div&gt;[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}
&lt;/div&gt;&lt;div&gt;[[Official Online Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]][[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]][[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]][[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]][[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]][[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]][[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]&lt;/div&gt;{{Advertisement2}}&lt;/div&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project_name_long}} Wiki]]

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project_name_short}} [[Trademark Policy|™]] | [[{{project_name_short}}:Copyrights|©]] {{name}} | [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Reasons for Freedom Software|Why?]])

    {{Admins}}&lt;/font&gt;</text>
      <sha1>qu3hqj0btl35femztl98ukerg18qasl</sha1>
    </revision>
    <revision>
      <id>74314</id>
      <parentid>74313</parentid>
      <timestamp>2021-12-11T12:21:43Z</timestamp>
      <contributor>
        <username>Admintemp</username>
        <id>5029</id>
      </contributor>
      <origin>74314</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2654" sha1="4dwswy6vwxeqlbnzs352tglq278ka0i" xml:space="preserve">
&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
&lt;div&gt;



&lt;div style="display: flex;justify-content: space-between;" class="footer-row-multi"&gt;&lt;div&gt;[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}
&lt;/div&gt;&lt;div&gt;[[Official Online Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]][[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]][[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]][[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]][[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]][[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]][[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]&lt;/div&gt;{{Advertisement2}}&lt;/div&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project_name_long}} Wiki]]

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project_name_short}} [[Trademark Policy|™]] | [[{{project_name_short}}:Copyrights|©]] {{name}} | [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Reasons for Freedom Software|Why?]])

    {{Admins}}&lt;/font&gt;</text>
      <sha1>4dwswy6vwxeqlbnzs352tglq278ka0i</sha1>
    </revision>
    <revision>
      <id>74315</id>
      <parentid>74314</parentid>
      <timestamp>2021-12-11T12:22:44Z</timestamp>
      <contributor>
        <username>Admintemp</username>
        <id>5029</id>
      </contributor>
      <origin>74315</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2650" sha1="kjcad6ch72j4g7hnh0be1ysnhht3jah" xml:space="preserve">
&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
&lt;div&gt;



&lt;div style="display: flex;justify-content: space-between;" class="footer-row-multi"&gt;&lt;div&gt;[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}
&lt;/div&gt;&lt;div&gt;[[Official Online Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]][[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]][[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]][[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]][[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]][[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]][[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]&lt;/div&gt;{{Advertisement2}}&lt;/div&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project_name_long}} Wiki]]

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project_name_short}} [[Trademark Policy|™]] | [[{{project_name_short}}:Copyrights|©]] {{name}} | [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Reasons for Freedom Software|Why?]])

{{Admins}}&lt;/font&gt;</text>
      <sha1>kjcad6ch72j4g7hnh0be1ysnhht3jah</sha1>
    </revision>
    <revision>
      <id>74338</id>
      <parentid>74315</parentid>
      <timestamp>2021-12-13T14:12:39Z</timestamp>
      <contributor>
        <username>Admintemp</username>
        <id>5029</id>
      </contributor>
      <origin>74338</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2670" sha1="fzsckbjherew8k6d7jqsui5cek5wi39" xml:space="preserve">
&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
&lt;div class="footer-main"&gt;



&lt;div style="display: flex;justify-content: space-between;" class="footer-row-multi"&gt;&lt;div&gt;[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}
&lt;/div&gt;&lt;div&gt;[[Official Online Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]][[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]][[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]][[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]][[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]][[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]][[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]&lt;/div&gt;{{Advertisement2}}&lt;/div&gt;

Search engines: {{link|link=https://search.yacy.net|text=YaCy}} | {{link|link=https://www.qwant.com|text=Qwant}} | {{link|link=https://www.ecosia.org|text=ecosia}} | {{link|link=https://metager.org|text=MetaGer}} | {{link|link=https://peekier.com|text=peekier}} | [[Special:Search|{{project_name_long}} Wiki]]

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project_name_short}} [[Trademark Policy|™]] | [[{{project_name_short}}:Copyrights|©]] {{name}} | [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Reasons for Freedom Software|Why?]])

{{Admins}}&lt;/font&gt;</text>
      <sha1>fzsckbjherew8k6d7jqsui5cek5wi39</sha1>
    </revision>
    <revision>
      <id>74996</id>
      <parentid>74338</parentid>
      <timestamp>2021-12-18T23:02:29Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>74996</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2359" sha1="4fugvo7pxfzlo52nikoea1wwkcjosw9" xml:space="preserve">
&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
&lt;div class="footer-main"&gt;



&lt;div style="display: flex;justify-content: space-between;" class="footer-row-multi"&gt;&lt;div&gt;[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}
&lt;/div&gt;&lt;div&gt;[[Official Online Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]][[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]][[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]][[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]][[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]][[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]][[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]&lt;/div&gt;{{Advertisement2}}&lt;/div&gt;

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project_name_short}} [[Trademark Policy|™]] | [[{{project_name_short}}:Copyrights|©]] {{name}} | [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Reasons for Freedom Software|Why?]])

{{Admins}}&lt;/font&gt;</text>
      <sha1>4fugvo7pxfzlo52nikoea1wwkcjosw9</sha1>
    </revision>
    <revision>
      <id>75137</id>
      <parentid>74996</parentid>
      <timestamp>2021-12-21T13:07:13Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>75137</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2358" sha1="rkwhe6k49urq3arjj96mf51n9s519cs" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
&lt;div class="footer-main"&gt;



&lt;div style="display: flex;justify-content: space-between;" class="footer-row-multi"&gt;&lt;div&gt;[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}
&lt;/div&gt;&lt;div&gt;[[Official Online Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]][[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]][[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]][[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]][[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]][[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]][[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]&lt;/div&gt;{{Advertisement2}}&lt;/div&gt;

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project_name_short}} [[Trademark Policy|™]] | [[{{project_name_short}}:Copyrights|©]] {{name}} | [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Reasons for Freedom Software|Why?]])

{{Admins}}&lt;/font&gt;</text>
      <sha1>rkwhe6k49urq3arjj96mf51n9s519cs</sha1>
    </revision>
    <revision>
      <id>75138</id>
      <parentid>75137</parentid>
      <timestamp>2021-12-21T13:07:39Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>75138</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2356" sha1="7dmpg5h039whhdhcb6f323gf487at15" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
&lt;div class="footer-main"&gt;

&lt;div style="display: flex;justify-content: space-between;" class="footer-row-multi"&gt;&lt;div&gt;[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}
&lt;/div&gt;&lt;div&gt;[[Official Online Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]][[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]][[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]][[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]][[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]][[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]][[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]&lt;/div&gt;{{Advertisement2}}&lt;/div&gt;

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder tor 386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project_name_short}} [[Trademark Policy|™]] | [[{{project_name_short}}:Copyrights|©]] {{name}} | [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Reasons for Freedom Software|Why?]])

{{Admins}}&lt;/font&gt;</text>
      <sha1>7dmpg5h039whhdhcb6f323gf487at15</sha1>
    </revision>
    <revision>
      <id>75253</id>
      <parentid>75138</parentid>
      <timestamp>2021-12-22T11:22:36Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>75253</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2356" sha1="q94ak5njapbtl7pb4z5qrkysvpqyqn8" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
&lt;div class="footer-main"&gt;

&lt;div style="display: flex;justify-content: space-between;" class="footer-row-multi"&gt;&lt;div&gt;[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}
&lt;/div&gt;&lt;div&gt;[[Official Online Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]][[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]][[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]][[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]][[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]][[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]][[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:Discourse_logo.png|25px|link=https://forums.{{project_name_short}}.org]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]&lt;/div&gt;{{Advertisement2}}&lt;/div&gt;

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder_tor_386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project_name_short}} [[Trademark Policy|™]] | [[{{project_name_short}}:Copyrights|©]] {{name}} | [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Reasons for Freedom Software|Why?]])

{{Admins}}&lt;/font&gt;</text>
      <sha1>q94ak5njapbtl7pb4z5qrkysvpqyqn8</sha1>
    </revision>
    <revision>
      <id>75931</id>
      <parentid>75253</parentid>
      <timestamp>2021-12-29T14:30:55Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>75931</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2350" sha1="mj8hbl7ixcfl0ba1y7r1v4a43261o8m" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
&lt;div class="footer-main"&gt;

&lt;div style="display: flex;justify-content: space-between;" class="footer-row-multi"&gt;&lt;div&gt;[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}
&lt;/div&gt;&lt;div&gt;[[Official Online Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]][[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]][[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]][[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]][[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]][[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]][[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:Discourse_logo.png|25px|link=https://forums.{{project_clearnet}}]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]&lt;/div&gt;{{Advertisement2}}&lt;/div&gt;

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder_tor_386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project_name_short}} [[Trademark Policy|™]] | [[{{project_name_short}}:Copyrights|©]] {{name}} | [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Reasons for Freedom Software|Why?]])

{{Admins}}&lt;/font&gt;</text>
      <sha1>mj8hbl7ixcfl0ba1y7r1v4a43261o8m</sha1>
    </revision>
    <revision>
      <id>75953</id>
      <parentid>75931</parentid>
      <timestamp>2021-12-29T15:53:10Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "Monero_donate_{{project_name_short}}.png" to "{{project_name_short}}_donate_monero.png"</comment>
      <origin>75953</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2350" sha1="o8io57s1c8xteyj0lzsqdxcp5tp7byp" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
&lt;div class="footer-main"&gt;

&lt;div style="display: flex;justify-content: space-between;" class="footer-row-multi"&gt;&lt;div&gt;[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:{{project_name_short}}_donate_monero.png|100px]] [[File:United Federation of Planets 1000px.png|100px]]

{{Share}}
&lt;/div&gt;&lt;div&gt;[[Official Online Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]][[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]][[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]][[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]][[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]][[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]][[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:Discourse_logo.png|25px|link=https://forums.{{project_clearnet}}]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]&lt;/div&gt;{{Advertisement2}}&lt;/div&gt;

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder_tor_386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project_name_short}} [[Trademark Policy|™]] | [[{{project_name_short}}:Copyrights|©]] {{name}} | [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Reasons for Freedom Software|Why?]])

{{Admins}}&lt;/font&gt;</text>
      <sha1>o8io57s1c8xteyj0lzsqdxcp5tp7byp</sha1>
    </revision>
    <revision>
      <id>75960</id>
      <parentid>75953</parentid>
      <timestamp>2021-12-29T16:00:18Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>75960</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2353" sha1="c1px4h299n2un0v51powuc7lovrfo6e" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
&lt;div class="footer-main"&gt;

&lt;div style="display: flex;justify-content: space-between;" class="footer-row-multi"&gt;&lt;div&gt;[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:{{project_name_short}}_donate_ethereum.png|100px]]

{{Share}}
&lt;/div&gt;&lt;div&gt;[[Official Online Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]][[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]][[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]][[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]][[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]][[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]][[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:Discourse_logo.png|25px|link=https://forums.{{project_clearnet}}]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Bitcoin_Pay}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]&lt;/div&gt;{{Advertisement2}}&lt;/div&gt;

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder_tor_386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project_name_short}} [[Trademark Policy|™]] | [[{{project_name_short}}:Copyrights|©]] {{name}} | [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Reasons for Freedom Software|Why?]])

{{Admins}}&lt;/font&gt;</text>
      <sha1>c1px4h299n2un0v51powuc7lovrfo6e</sha1>
    </revision>
    <revision>
      <id>76231</id>
      <parentid>75960</parentid>
      <timestamp>2022-01-01T08:10:35Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "Bitcoin_Pay" to "Pay_Bitcoin"</comment>
      <origin>76231</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2353" sha1="h2x7lxggwnkhbpj3wthgqhpw7n40hc9" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
&lt;div class="footer-main"&gt;

&lt;div style="display: flex;justify-content: space-between;" class="footer-row-multi"&gt;&lt;div&gt;[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:Monero_donate_{{project_name_short}}.png|100px]] [[File:{{project_name_short}}_donate_ethereum.png|100px]]

{{Share}}
&lt;/div&gt;&lt;div&gt;[[Official Online Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]][[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]][[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]][[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]][[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]][[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]][[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:Discourse_logo.png|25px|link=https://forums.{{project_clearnet}}]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Pay_Bitcoin}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]&lt;/div&gt;{{Advertisement2}}&lt;/div&gt;

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder_tor_386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project_name_short}} [[Trademark Policy|™]] | [[{{project_name_short}}:Copyrights|©]] {{name}} | [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Reasons for Freedom Software|Why?]])

{{Admins}}&lt;/font&gt;</text>
      <sha1>h2x7lxggwnkhbpj3wthgqhpw7n40hc9</sha1>
    </revision>
    <revision>
      <id>76528</id>
      <parentid>76231</parentid>
      <timestamp>2022-01-06T11:16:08Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "Monero_donate_{{project_name_short}}" to "{{project_name_short}}_donate_monero"</comment>
      <origin>76528</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2353" sha1="ez86qcq3iclva6dkzt00mxob6191l4k" xml:space="preserve">&lt;hr&gt;
&lt;div style="padding-bottom:1px; padding-top:6px; border:thin solid black; background:#EEEEEE; text-align:center;"&gt;
{{Advertisement}}
&lt;/div&gt;
&lt;div class="footer-main"&gt;

&lt;div style="display: flex;justify-content: space-between;" class="footer-row-multi"&gt;&lt;div&gt;[[File:{{project_name_short}}_donate_bitcoin.png|100px]] [[File:{{project_name_short}}_donate_monero.png|100px]] [[File:{{project_name_short}}_donate_ethereum.png|100px]]

{{Share}}
&lt;/div&gt;&lt;div&gt;[[Official Online Profiles|Follow]]:
[[File:1024px-Telegram_2019_Logo.svg.png|25px|link=https://t.me/s/{{project_name_short}}_All_News]][[File:Iconfinder Apple Mail 2697658.png|25px|link=https://mailman.{{project_name_short_lowercase}}.org/postorius/lists/{{project_name_short_lowercase}}-newsletter.mailman.{{project_clearnet}}/]][[File:twitter.png|25px|link=https://twitter.com/{{project_name_short}}]][[File:facebook.png|25px|link=https://www.facebook.com/{{project_name_short}}]][[File:rss.png|25px|link=https://forums.{{project_clearnet}}/c/news.rss]][[File:Reddit.jpg|25px|link=https://www.reddit.com/r/{{project_name_short}}]][[File:200px-Mastodon Logotype (Simple).svg.png|25px|link=https://mastodon.technology/@{{project_name_short}}]]

[[Support|Support]]:
[[File:Discourse_logo.png|25px|link=https://forums.{{project_clearnet}}]]

[[Donate]]: [[File:Donate.png|25px|alt=Donate|link=Donate|Donate]] [[File:bank-gray-md.png|25px|alt=Bank Wire|link=Bank Wire]] [[File:de-pp-logo-200px.png|alt=Paypal|link=Pay_by_PayPal_Subscription|25px]] [[File:BC_Logo_.png|25px|alt=Bitcoin accepted here|link=bitcoin:{{Pay_Bitcoin}}]] [[File:Monero-symbol-1280.png|25px|alt=Monero accepted here|link=Donate]] [[File:Circle-question.png|25px|alt=Contribute|link=Contribute|Contribute]]&lt;/div&gt;{{Advertisement2}}&lt;/div&gt;

{{RandomNews}}

[[File:https_long.png|50px|alt=https link|link=https://www.{{project_clearnet}}{{localurl:{{FULLPAGENAME}}}}]] [[File:Iconfinder_tor_386502.png|25px|alt=onion link|link=http://www.{{project_onion}}{{localurl:{{FULLPAGENAME}}}}]] [[Priority Support]] | [[Investors]] | [[Professional Support]]

&lt;font size="-1"&gt;{{project_name_short}} [[Trademark Policy|™]] | [[{{project_name_short}}:Copyrights|©]] {{name}} | [[File:Heckert gnu.big.png|25px]] Freedom Software / [[File:Osi standard logo 0.png|25px]] Open Source ([[Reasons for Freedom Software|Why?]])

{{Admins}}&lt;/font&gt;</text>
      <sha1>ez86qcq3iclva6dkzt00mxob6191l4k</sha1>
    </revision>
    <revision>
      <id>76596</id>
      <parentid>76528</parentid>
      <timestamp>2022-01-06T18:31:02Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>76596</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="439" sha1="5ib7mz913srighm07xgeqx6wn5c70s6" xml:space="preserve">{{#css:Mediawiki:Footer2.css}}
&lt;div class="main-footer"&gt;
{{#widget:Footer2
 |context={{SERVER}}
 |bitcoin={{Pay_Bitcoin}}
 |bitcoinImgUrl={{Pay_bitcoin_qr_imgurl}}
 |monero={{Pay_Monero}}
 |moneroImgUrl={{Pay_monero_qr_imgurl}}
 |ether={{Pay_Ethereum}}
 |etherImgUrl={{Pay_ethereum_qr_imgurl}}
 |projectName={{Project name short}}
 |projectDomainClearnet={{Project clearnet}}
 |projectDomainOnion={{Project onion}}
}}
{{RandomNews}}
&lt;/div&gt;</text>
      <sha1>5ib7mz913srighm07xgeqx6wn5c70s6</sha1>
    </revision>
    <revision>
      <id>77122</id>
      <parentid>76596</parentid>
      <timestamp>2022-01-10T11:20:46Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>77122</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="457" sha1="5zsh9ncm1jpumvp1keariz15o8dj3q7" xml:space="preserve">{{#css:Mediawiki:Footer2.css}}
&lt;div class="main-footer"&gt;
{{#widget:Footer2
 |context={{SERVER}}
 |bitcoin={{Pay_Bitcoin}}
 |bitcoinImgUrl={{Pay_bitcoin_qr_imgurl}}
 |monero={{Pay_Monero}}
 |moneroImgUrl={{Pay_monero_qr_imgurl}}
 |ether={{Pay_Ethereum}}
 |etherImgUrl={{Pay_ethereum_qr_imgurl}}
 |projectName={{Project name short}}
 |projectDomainClearnet={{Project clearnet}}
 |projectDomainOnion={{Project onion}}
}}
{{RandomNews}}
&lt;/div&gt;

{{FULLPAGENAME}}</text>
      <sha1>5zsh9ncm1jpumvp1keariz15o8dj3q7</sha1>
    </revision>
    <revision>
      <id>77123</id>
      <parentid>77122</parentid>
      <timestamp>2022-01-10T11:21:17Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>77123</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="439" sha1="5ib7mz913srighm07xgeqx6wn5c70s6" xml:space="preserve">{{#css:Mediawiki:Footer2.css}}
&lt;div class="main-footer"&gt;
{{#widget:Footer2
 |context={{SERVER}}
 |bitcoin={{Pay_Bitcoin}}
 |bitcoinImgUrl={{Pay_bitcoin_qr_imgurl}}
 |monero={{Pay_Monero}}
 |moneroImgUrl={{Pay_monero_qr_imgurl}}
 |ether={{Pay_Ethereum}}
 |etherImgUrl={{Pay_ethereum_qr_imgurl}}
 |projectName={{Project name short}}
 |projectDomainClearnet={{Project clearnet}}
 |projectDomainOnion={{Project onion}}
}}
{{RandomNews}}
&lt;/div&gt;</text>
      <sha1>5ib7mz913srighm07xgeqx6wn5c70s6</sha1>
    </revision>
    <revision>
      <id>77632</id>
      <parentid>77123</parentid>
      <timestamp>2022-01-17T10:25:16Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>77632</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="438" sha1="hwobal8xpzelz47e619xe8mnxe9ycsl" xml:space="preserve">{{#css:Mediawiki:Footer2.css}}
&lt;div id="custom-footer"&gt;
{{#widget:Footer2
 |context={{SERVER}}
 |bitcoin={{Pay_Bitcoin}}
 |bitcoinImgUrl={{Pay_bitcoin_qr_imgurl}}
 |monero={{Pay_Monero}}
 |moneroImgUrl={{Pay_monero_qr_imgurl}}
 |ether={{Pay_Ethereum}}
 |etherImgUrl={{Pay_ethereum_qr_imgurl}}
 |projectName={{Project name short}}
 |projectDomainClearnet={{Project clearnet}}
 |projectDomainOnion={{Project onion}}
}}
{{RandomNews}}
&lt;/div&gt;</text>
      <sha1>hwobal8xpzelz47e619xe8mnxe9ycsl</sha1>
    </revision>
    <revision>
      <id>77739</id>
      <parentid>77632</parentid>
      <timestamp>2022-01-17T16:16:07Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>77739</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="436" sha1="ccvqqv848iznqmkxblqnb4tjhtr9w87" xml:space="preserve">{{#css:Mediawiki:Footer.css}}
&lt;div id="custom-footer"&gt;
{{#widget:Footer
 |context={{SERVER}}
 |bitcoin={{Pay_Bitcoin}}
 |bitcoinImgUrl={{Pay_bitcoin_qr_imgurl}}
 |monero={{Pay_Monero}}
 |moneroImgUrl={{Pay_monero_qr_imgurl}}
 |ether={{Pay_Ethereum}}
 |etherImgUrl={{Pay_ethereum_qr_imgurl}}
 |projectName={{Project name short}}
 |projectDomainClearnet={{Project clearnet}}
 |projectDomainOnion={{Project onion}}
}}
{{RandomNews}}
&lt;/div&gt;</text>
      <sha1>ccvqqv848iznqmkxblqnb4tjhtr9w87</sha1>
    </revision>
    <revision>
      <id>77776</id>
      <parentid>77739</parentid>
      <timestamp>2022-01-17T19:44:05Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>77776</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="436" sha1="5o95mjy9c6g442ikbb1x57xfbdnfo0l" xml:space="preserve">{{#css:Mediawiki:Footer.css}}
&lt;div id="custom-footer"&gt;
{{#widget:Footer
 |context={{SERVER}}
 |bitcoin={{Pay_Bitcoin}}
 |bitcoinImgUrl={{Pay_bitcoin_qr_imgurl}}
 |monero={{Pay_Monero}}
 |moneroImgUrl={{Pay_monero_qr_imgurl}}
 |ether={{Pay_Ethereum}}
 |etherImgUrl={{Pay_ethereum_qr_imgurl}}
 |projectName={{project_name_short}}
 |projectDomainClearnet={{project_clearnet}}
 |projectDomainOnion={{project_onion}}
}}
{{RandomNews}}
&lt;/div&gt;</text>
      <sha1>5o95mjy9c6g442ikbb1x57xfbdnfo0l</sha1>
    </revision>
    <revision>
      <id>82986</id>
      <parentid>77776</parentid>
      <timestamp>2022-03-23T14:22:48Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>82986</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="515" sha1="2in33eshbyv6hrbg6evf0cbqko4lt0s" xml:space="preserve">{{#css:Mediawiki:Footer.css}}
&lt;div id="custom-footer"&gt;
{{#widget:Footer
 |context={{SERVER}}
 |bitcoin={{Pay_Bitcoin}}
 |bitcoinImgUrl={{Pay_bitcoin_qr_imgurl}}
 |monero={{Pay_Monero}}
 |moneroImgUrl={{Pay_monero_qr_imgurl}}
 |ether={{Pay_Ethereum}}
 |etherImgUrl={{Pay_ethereum_qr_imgurl}}
 |projectName={{project_name_short}}
 |projectDomainClearnet={{project_clearnet}}
 |projectDomainOnion={{project_onion}}
 |projectTelegramAllNewsChannelName={{project_telegram_all_news_channel_name}}
}}
{{RandomNews}}
&lt;/div&gt;</text>
      <sha1>2in33eshbyv6hrbg6evf0cbqko4lt0s</sha1>
    </revision>
    <revision>
      <id>83004</id>
      <parentid>82986</parentid>
      <timestamp>2022-03-24T13:34:38Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>83004</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="530" sha1="n4bwbb3ckhvviq5vstyzzqoiwaoew8r" xml:space="preserve">{{#css:Mediawiki:Footer.css}}
&lt;div id="custom-footer"&gt;
{{#widget:Footer
 |context={{SERVER}}
 |Pay_Bitcoin={{Pay_Bitcoin}}
 |bitcoinImgUrl={{Pay_bitcoin_qr_imgurl}}
 |Pay_Monero={{Pay_Monero}}
 |moneroImgUrl={{Pay_monero_qr_imgurl}}
 |Pay_Ethereum={{Pay_Ethereum}}
 |etherImgUrl={{Pay_ethereum_qr_imgurl}}
 |projectName={{project_name_short}}
 |projectDomainClearnet={{project_clearnet}}
 |projectDomainOnion={{project_onion}}
 |projectTelegramAllNewsChannelName={{project_telegram_all_news_channel_name}}
}}
{{RandomNews}}
&lt;/div&gt;</text>
      <sha1>n4bwbb3ckhvviq5vstyzzqoiwaoew8r</sha1>
    </revision>
    <revision>
      <id>84026</id>
      <parentid>83004</parentid>
      <timestamp>2022-07-11T19:03:36Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>84026</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="620" sha1="lo6rbw15rpkdin0uoxz8qbxwanh4z8s" xml:space="preserve">{{#css:Mediawiki:Footer.css}}
&lt;div id="custom-footer"&gt;
{{#widget:Footer
 |context={{SERVER}}
 |Pay_Bitcoin={{Pay_Bitcoin}}
 |bitcoinImgUrl={{Pay_bitcoin_qr_imgurl}}
 |Pay_Monero={{Pay_Monero}}
 |moneroImgUrl={{Pay_monero_qr_imgurl}}
 |Pay_Ethereum={{Pay_Ethereum}}
 |etherImgUrl={{Pay_ethereum_qr_imgurl}}
 |projectName={{project_name_short}}
 |projectDomainClearnet={{project_clearnet}}
 |projectDomainOnion={{project_onion}}
 |projectTelegramAllNewsChannelName={{project_telegram_all_news_channel_name}}
 |projectSloganShort={{project_slogan_short}}
 |projectSloganLong={{project_slogan_long}}
}}
{{RandomNews}}
&lt;/div&gt;</text>
      <sha1>lo6rbw15rpkdin0uoxz8qbxwanh4z8s</sha1>
    </revision>
    <revision>
      <id>87930</id>
      <parentid>84026</parentid>
      <timestamp>2022-09-21T09:39:57Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>87930</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="689" sha1="g97nvfgecbj9j64b6q4ab6k4w1tk23z" xml:space="preserve">{{#css:Mediawiki:Footer.css}}
&lt;div id="custom-footer"&gt;
{{#widget:Footer
 |context={{SERVER}}
 |Pay_Bitcoin={{Pay_Bitcoin}}
 |bitcoinImgUrl={{Pay_bitcoin_qr_imgurl}}
 |Pay_Monero={{Pay_Monero}}
 |moneroImgUrl={{Pay_monero_qr_imgurl}}
 |Pay_Ethereum={{Pay_Ethereum}}
 |etherImgUrl={{Pay_ethereum_qr_imgurl}}
 |projectName={{project_name_short}}
 |projectDomainClearnet={{project_clearnet}}
 |projectDomainOnion={{project_onion}}
 |projectTelegramAllNewsChannelName={{project_telegram_all_news_channel_name}}
 |projectSloganShort={{project_slogan_short}}
 |projectSloganLong={{project_slogan_long}}
 |page={{FULLPAGENAME}}
 |shareUrl={{canonicalurl:{{FULLPAGENAME}}}}
}}
{{RandomNews}}
&lt;/div&gt;</text>
      <sha1>g97nvfgecbj9j64b6q4ab6k4w1tk23z</sha1>
    </revision>
    <revision>
      <id>88804</id>
      <parentid>87930</parentid>
      <timestamp>2022-10-20T15:46:21Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>88804</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="674" sha1="a4x7aiy2vdicsr33b01h1p7j4iwb1aw" xml:space="preserve">{{#css:Mediawiki:Footer.css}}
&lt;div id="custom-footer"&gt;
{{#widget:Footer
 |context={{SERVER}}
 |Pay_Bitcoin={{Pay_Bitcoin}}
 |bitcoinImgUrl={{Pay_bitcoin_qr_imgurl}}
 |Pay_Monero={{Pay_Monero}}
 |moneroImgUrl={{Pay_monero_qr_imgurl}}
 |Pay_Ethereum={{Pay_Ethereum}}
 |etherImgUrl={{Pay_ethereum_qr_imgurl}}
 |projectName={{project_name_short}}
 |projectDomainClearnet={{project_clearnet}}
 |projectDomainOnion={{project_onion}}
 |projectTelegramAllNewsChannelName={{project_telegram_all_news_channel_name}}
 |projectSloganShort={{project_slogan_short}}
 |projectSloganLong={{project_slogan_long}}
 |page={{FULLPAGENAME}}
 |shareUrl={{canonicalurl:{{FULLPAGENAME}}}}
}}
&lt;/div&gt;</text>
      <sha1>a4x7aiy2vdicsr33b01h1p7j4iwb1aw</sha1>
    </revision>
    <revision>
      <id>89959</id>
      <parentid>88804</parentid>
      <timestamp>2022-11-23T22:33:01Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>89959</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="736" sha1="l427akb5w0ipz6otgy3snbkzsydt68o" xml:space="preserve">{{#css:Mediawiki:Footer.css}}
&lt;div id="custom-footer"&gt;
{{#widget:Footer
 |context={{SERVER}}
 |Pay_Bitcoin={{Pay_Bitcoin}}
 |bitcoinImgUrl={{Pay_bitcoin_qr_imgurl}}
 |Pay_Monero={{Pay_Monero}}
 |moneroImgUrl={{Pay_monero_qr_imgurl}}
 |Pay_Ethereum={{Pay_Ethereum}}
 |etherImgUrl={{Pay_ethereum_qr_imgurl}}
 |projectName={{project_name_short}}
 |projectNameShortLowerCase={{project_name_short_lower_case}}
 |projectDomainClearnet={{project_clearnet}}
 |projectDomainOnion={{project_onion}}
 |projectTelegramAllNewsChannelName={{project_telegram_all_news_channel_name}}
 |projectSloganShort={{project_slogan_short}}
 |projectSloganLong={{project_slogan_long}}
 |page={{FULLPAGENAME}}
 |shareUrl={{canonicalurl:{{FULLPAGENAME}}}}
}}
&lt;/div&gt;</text>
      <sha1>l427akb5w0ipz6otgy3snbkzsydt68o</sha1>
    </revision>
    <revision>
      <id>89961</id>
      <parentid>89959</parentid>
      <timestamp>2022-11-23T22:34:42Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>89961</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="735" sha1="l2wntlhjvncc934jebkcf18df5s2d77" xml:space="preserve">{{#css:Mediawiki:Footer.css}}
&lt;div id="custom-footer"&gt;
{{#widget:Footer
 |context={{SERVER}}
 |Pay_Bitcoin={{Pay_Bitcoin}}
 |bitcoinImgUrl={{Pay_bitcoin_qr_imgurl}}
 |Pay_Monero={{Pay_Monero}}
 |moneroImgUrl={{Pay_monero_qr_imgurl}}
 |Pay_Ethereum={{Pay_Ethereum}}
 |etherImgUrl={{Pay_ethereum_qr_imgurl}}
 |projectName={{project_name_short}}
 |projectNameShortLowerCase={{project_name_short_lowercase}}
 |projectDomainClearnet={{project_clearnet}}
 |projectDomainOnion={{project_onion}}
 |projectTelegramAllNewsChannelName={{project_telegram_all_news_channel_name}}
 |projectSloganShort={{project_slogan_short}}
 |projectSloganLong={{project_slogan_long}}
 |page={{FULLPAGENAME}}
 |shareUrl={{canonicalurl:{{FULLPAGENAME}}}}
}}
&lt;/div&gt;</text>
      <sha1>l2wntlhjvncc934jebkcf18df5s2d77</sha1>
    </revision>
    <revision>
      <id>90049</id>
      <parentid>89961</parentid>
      <timestamp>2022-11-25T10:05:31Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>90049</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="705" sha1="q4c59cbktwctee7u2yue1lltwyva2w6" xml:space="preserve">&lt;div id="custom-footer"&gt;
{{#widget:Footer
 |context={{SERVER}}
 |Pay_Bitcoin={{Pay_Bitcoin}}
 |bitcoinImgUrl={{Pay_bitcoin_qr_imgurl}}
 |Pay_Monero={{Pay_Monero}}
 |moneroImgUrl={{Pay_monero_qr_imgurl}}
 |Pay_Ethereum={{Pay_Ethereum}}
 |etherImgUrl={{Pay_ethereum_qr_imgurl}}
 |projectName={{project_name_short}}
 |projectNameShortLowerCase={{project_name_short_lowercase}}
 |projectDomainClearnet={{project_clearnet}}
 |projectDomainOnion={{project_onion}}
 |projectTelegramAllNewsChannelName={{project_telegram_all_news_channel_name}}
 |projectSloganShort={{project_slogan_short}}
 |projectSloganLong={{project_slogan_long}}
 |page={{FULLPAGENAME}}
 |shareUrl={{canonicalurl:{{FULLPAGENAME}}}}
}}
&lt;/div&gt;</text>
      <sha1>q4c59cbktwctee7u2yue1lltwyva2w6</sha1>
    </revision>
    <revision>
      <id>93785</id>
      <parentid>90049</parentid>
      <timestamp>2023-05-06T10:54:53Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>93785</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="1176" sha1="mh315ywdk4jsqwfayw6c5csoiwj9a45" xml:space="preserve">&lt;div id="custom-footer"&gt;
{{#widget:Footer
 |context={{SERVER}}
 |Pay_Bitcoin={{Pay_Bitcoin}}
 |bitcoinImgUrl={{Pay_bitcoin_qr_imgurl}}
 |Pay_Monero={{Pay_Monero}}
 |moneroImgUrl={{Pay_monero_qr_imgurl}}
 |Pay_Ethereum={{Pay_Ethereum}}
 |etherImgUrl={{Pay_ethereum_qr_imgurl}}
 |projectName={{project_name_short}}
 |projectNameShortLowerCase={{project_name_short_lowercase}}
 |projectDomainClearnet={{project_clearnet}}
 |projectDomainOnion={{project_onion}}
 |projectTelegramAllNewsChannelName={{project_telegram_all_news_channel_name}}
 |projectSloganShort={{project_slogan_short}}
 |projectSloganLong={{project_slogan_long}}
 |page={{FULLPAGENAME}}
 |shareUrl={{canonicalurl:{{FULLPAGENAME}}}}
}}
&lt;/div&gt;
{{FlyInNotification
|imgSrc=/w/images/thumb/e/e8/Flyin-donate-promo.jpg/300px-Flyin-donate-promo.jpg
|imgWidth=300
|imgHeight=215
|imgLink=/wiki/Donate
|headline=Your support makes&lt;br&gt;all the difference!
|html=We believe security software like {{project_name_short}} needs to remain open source and independent. &lt;b&gt;Would you help&lt;/b&gt; sustain and grow the project? Learn more about our &lt;a href="/wiki/Donate" target="_blank"&gt;10 year success story and maybe DONATE!&lt;/a&gt;
}}</text>
      <sha1>mh315ywdk4jsqwfayw6c5csoiwj9a45</sha1>
    </revision>
    <revision>
      <id>95778</id>
      <parentid>93785</parentid>
      <timestamp>2023-08-24T13:39:34Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>95778</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="876" sha1="qz17t61xetfccccccfso144kbg5dft9" xml:space="preserve">{{GoogleOff | content=
&lt;div id="custom-footer"&gt;
{{#widget:Footer
 |context={{SERVER}}
 |projectName={{project_name_short}}
 |projectNameShortLowerCase={{project_name_short_lowercase}}
 |projectDomainClearnet={{project_clearnet}}
 |projectDomainOnion={{project_onion}}
 |projectTelegramAllNewsChannelName={{project_telegram_all_news_channel_name}}
 |projectSloganShort={{project_slogan_short}}
}}
&lt;/div&gt;
{{FlyInNotification
|imgSrc=/w/images/thumb/e/e8/Flyin-donate-promo.jpg/300px-Flyin-donate-promo.jpg
|imgWidth=300
|imgHeight=215
|imgLink=/wiki/Donate
|headline=Your support makes&lt;br&gt;all the difference!
|html=We believe security software like {{project_name_short}} needs to remain open source and independent. &lt;b&gt;Would you help&lt;/b&gt; sustain and grow the project? Learn more about our &lt;a href="/wiki/Donate" target="_blank"&gt;10 year success story and maybe DONATE!&lt;/a&gt;
}}
}}</text>
      <sha1>qz17t61xetfccccccfso144kbg5dft9</sha1>
    </revision>
    <revision>
      <id>95889</id>
      <parentid>95778</parentid>
      <timestamp>2023-09-01T10:47:54Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>95889</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="855" sha1="qyoqleggbv2d59hsf0v1gvju1hoyaxn" xml:space="preserve">{{GoogleOff | content=
&lt;div id="custom-footer"&gt;
{{#widget:Footer
 |context={{SERVER}}
 |projectName={{project_name_short}}
 |projectNameLong={{project_name_long}}
 |projectDomainClearnet={{project_clearnet}}
 |projectDomainOnion={{project_onion}}
 |projectTelegramAllNewsChannelName={{project_telegram_all_news_channel_name}}
 |projectSloganShort={{project_slogan_short}}
}}
&lt;/div&gt;
{{FlyInNotification
|imgSrc=/w/images/thumb/e/e8/Flyin-donate-promo.jpg/300px-Flyin-donate-promo.jpg
|imgWidth=300
|imgHeight=215
|imgLink=/wiki/Donate
|headline=Your support makes&lt;br&gt;all the difference!
|html=We believe security software like {{project_name_short}} needs to remain open source and independent. &lt;b&gt;Would you help&lt;/b&gt; sustain and grow the project? Learn more about our &lt;a href="/wiki/Donate" target="_blank"&gt;10 year success story and maybe DONATE!&lt;/a&gt;
}}
}}</text>
      <sha1>qyoqleggbv2d59hsf0v1gvju1hoyaxn</sha1>
    </revision>
    <revision>
      <id>95930</id>
      <parentid>95889</parentid>
      <timestamp>2023-09-01T13:56:42Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>95930</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="863" sha1="d8tprky64dq1txd7za61bk4yd7yvze6" xml:space="preserve">{{GoogleOff | content=
&lt;div id="custom-footer"&gt;
{{#widget:Footer
 |context={{SERVER}}
 |projectName={{project_name_short}}
 |projectNameLong={{project_name_long}}
 |projectDomainClearnet={{project_clearnet}}
 |projectDomainOnion={{project_onion}}
 |projectTelegramAllNewsChannelName={{project_telegram_all_news_channel_name}}
 |projectSloganShort={{project_slogan_short}}
 |tm=tm
}}
&lt;/div&gt;
{{FlyInNotification
|imgSrc=/w/images/thumb/e/e8/Flyin-donate-promo.jpg/300px-Flyin-donate-promo.jpg
|imgWidth=300
|imgHeight=215
|imgLink=/wiki/Donate
|headline=Your support makes&lt;br&gt;all the difference!
|html=We believe security software like {{project_name_short}} needs to remain open source and independent. &lt;b&gt;Would you help&lt;/b&gt; sustain and grow the project? Learn more about our &lt;a href="/wiki/Donate" target="_blank"&gt;10 year success story and maybe DONATE!&lt;/a&gt;
}}
}}</text>
      <sha1>d8tprky64dq1txd7za61bk4yd7yvze6</sha1>
    </revision>
    <revision>
      <id>96130</id>
      <parentid>95930</parentid>
      <timestamp>2023-09-19T15:13:15Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>96130</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="862" sha1="eeqhedu3eef0luqpwtrn2tjiaizg1ww" xml:space="preserve">{{GoogleOff | content=
&lt;div id="custom-footer"&gt;
{{#widget:Footer
 |context={{SERVER}}
 |projectName={{project_name_short}}
 |projectNameLong={{project_name_long}}
 |projectDomainClearnet={{project_clearnet}}
 |projectDomainOnion={{project_onion}}
 |projectTelegramAllNewsChannelName={{project_telegram_all_news_channel_name}}
 |projectSloganShort={{project_slogan_short}}
 |tm=r
}}
&lt;/div&gt;
{{FlyInNotification
|imgSrc=/w/images/thumb/e/e8/Flyin-donate-promo.jpg/300px-Flyin-donate-promo.jpg
|imgWidth=300
|imgHeight=215
|imgLink=/wiki/Donate
|headline=Your support makes&lt;br&gt;all the difference!
|html=We believe security software like {{project_name_short}} needs to remain open source and independent. &lt;b&gt;Would you help&lt;/b&gt; sustain and grow the project? Learn more about our &lt;a href="/wiki/Donate" target="_blank"&gt;10 year success story and maybe DONATE!&lt;/a&gt;
}}
}}</text>
      <sha1>eeqhedu3eef0luqpwtrn2tjiaizg1ww</sha1>
    </revision>
    <revision>
      <id>96809</id>
      <parentid>96130</parentid>
      <timestamp>2023-09-19T19:46:16Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>96809</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="863" sha1="d8tprky64dq1txd7za61bk4yd7yvze6" xml:space="preserve">{{GoogleOff | content=
&lt;div id="custom-footer"&gt;
{{#widget:Footer
 |context={{SERVER}}
 |projectName={{project_name_short}}
 |projectNameLong={{project_name_long}}
 |projectDomainClearnet={{project_clearnet}}
 |projectDomainOnion={{project_onion}}
 |projectTelegramAllNewsChannelName={{project_telegram_all_news_channel_name}}
 |projectSloganShort={{project_slogan_short}}
 |tm=tm
}}
&lt;/div&gt;
{{FlyInNotification
|imgSrc=/w/images/thumb/e/e8/Flyin-donate-promo.jpg/300px-Flyin-donate-promo.jpg
|imgWidth=300
|imgHeight=215
|imgLink=/wiki/Donate
|headline=Your support makes&lt;br&gt;all the difference!
|html=We believe security software like {{project_name_short}} needs to remain open source and independent. &lt;b&gt;Would you help&lt;/b&gt; sustain and grow the project? Learn more about our &lt;a href="/wiki/Donate" target="_blank"&gt;10 year success story and maybe DONATE!&lt;/a&gt;
}}
}}</text>
      <sha1>d8tprky64dq1txd7za61bk4yd7yvze6</sha1>
    </revision>
    <revision>
      <id>97396</id>
      <parentid>96809</parentid>
      <timestamp>2023-10-01T19:43:44Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>97396</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="905" sha1="o9orkheng2o3f0zjig1yfwztgwyejsy" xml:space="preserve">{{GoogleOff | content=
&lt;div id="custom-footer"&gt;
{{#widget:Footer
 |context={{SERVER}}
 |projectName={{project_name_short}}
 |projectNameShort={{project_name_short}}
 |projectNameLong={{project_name_long}}
 |projectDomainClearnet={{project_clearnet}}
 |projectDomainOnion={{project_onion}}
 |projectTelegramAllNewsChannelName={{project_telegram_all_news_channel_name}}
 |projectSloganShort={{project_slogan_short}}
 |tm=tm
}}
&lt;/div&gt;
{{FlyInNotification
|imgSrc=/w/images/thumb/e/e8/Flyin-donate-promo.jpg/300px-Flyin-donate-promo.jpg
|imgWidth=300
|imgHeight=215
|imgLink=/wiki/Donate
|headline=Your support makes&lt;br&gt;all the difference!
|html=We believe security software like {{project_name_short}} needs to remain open source and independent. &lt;b&gt;Would you help&lt;/b&gt; sustain and grow the project? Learn more about our &lt;a href="/wiki/Donate" target="_blank"&gt;10 year success story and maybe DONATE!&lt;/a&gt;
}}
}}</text>
      <sha1>o9orkheng2o3f0zjig1yfwztgwyejsy</sha1>
    </revision>
    <revision>
      <id>97576</id>
      <parentid>97396</parentid>
      <timestamp>2023-10-04T08:55:18Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>97576</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="905" sha1="kc54ac4lh4bth0uvmk7rr8dm54vz99f" xml:space="preserve">{{GoogleOff | content=
&lt;div id="custom-footer"&gt;
{{#widget:Footer
 |context={{SERVER}}
 |projectName={{project_name_short}}
 |projectNameShort={{project_name_short}}
 |projectNameLong={{project_name_long}}
 |projectDomainClearnet={{project_clearnet}}
 |projectDomainOnion={{project_onion}}
 |projectTelegramAllNewsChannelName={{project_telegram_all_news_channel_name}}
 |projectSloganShort={{project_slogan_short}}
 |tm=tm
}}
&lt;/div&gt;
{{FlyInNotification
|imgSrc=/w/images/thumb/e/e8/Flyin-donate-promo.jpg/300px-Flyin-donate-promo.jpg
|imgWidth=300
|imgHeight=215
|imgLink=/wiki/Donate
|headline=Your support makes&lt;br&gt;all the difference!
|html=We believe security software like {{project_name_short}} needs to remain open source and independent. &lt;b&gt;Would you help&lt;/b&gt; sustain and grow the project? Learn more about our &lt;a href="/wiki/Donate" target="_blank"&gt;11 year success story and maybe DONATE!&lt;/a&gt;
}}
}}</text>
      <sha1>kc54ac4lh4bth0uvmk7rr8dm54vz99f</sha1>
    </revision>
    <revision>
      <id>98171</id>
      <parentid>97576</parentid>
      <timestamp>2023-12-07T10:15:22Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>98171</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="904" sha1="k1bw0ecxnju3deqm34w5dg6yt09bre3" xml:space="preserve">{{GoogleOff | content=
&lt;div id="custom-footer"&gt;
{{#widget:Footer
 |context={{SERVER}}
 |projectName={{project_name_short}}
 |projectNameShort={{project_name_short}}
 |projectNameLong={{project_name_long}}
 |projectDomainClearnet={{project_clearnet}}
 |projectDomainOnion={{project_onion}}
 |projectTelegramAllNewsChannelName={{project_telegram_all_news_channel_name}}
 |projectSloganShort={{project_slogan_short}}
 |tm=r
}}
&lt;/div&gt;
{{FlyInNotification
|imgSrc=/w/images/thumb/e/e8/Flyin-donate-promo.jpg/300px-Flyin-donate-promo.jpg
|imgWidth=300
|imgHeight=215
|imgLink=/wiki/Donate
|headline=Your support makes&lt;br&gt;all the difference!
|html=We believe security software like {{project_name_short}} needs to remain open source and independent. &lt;b&gt;Would you help&lt;/b&gt; sustain and grow the project? Learn more about our &lt;a href="/wiki/Donate" target="_blank"&gt;11 year success story and maybe DONATE!&lt;/a&gt;
}}
}}</text>
      <sha1>k1bw0ecxnju3deqm34w5dg6yt09bre3</sha1>
    </revision>
    <revision>
      <id>98489</id>
      <parentid>98171</parentid>
      <timestamp>2024-01-16T10:13:34Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "11 year" to "{{project_age_years}} year"</comment>
      <origin>98489</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="923" sha1="htv7otn748aw7o7f17an28dhsjtjts9" xml:space="preserve">{{GoogleOff | content=
&lt;div id="custom-footer"&gt;
{{#widget:Footer
 |context={{SERVER}}
 |projectName={{project_name_short}}
 |projectNameShort={{project_name_short}}
 |projectNameLong={{project_name_long}}
 |projectDomainClearnet={{project_clearnet}}
 |projectDomainOnion={{project_onion}}
 |projectTelegramAllNewsChannelName={{project_telegram_all_news_channel_name}}
 |projectSloganShort={{project_slogan_short}}
 |tm=r
}}
&lt;/div&gt;
{{FlyInNotification
|imgSrc=/w/images/thumb/e/e8/Flyin-donate-promo.jpg/300px-Flyin-donate-promo.jpg
|imgWidth=300
|imgHeight=215
|imgLink=/wiki/Donate
|headline=Your support makes&lt;br&gt;all the difference!
|html=We believe security software like {{project_name_short}} needs to remain open source and independent. &lt;b&gt;Would you help&lt;/b&gt; sustain and grow the project? Learn more about our &lt;a href="/wiki/Donate" target="_blank"&gt;{{project_age_years}} year success story and maybe DONATE!&lt;/a&gt;
}}
}}</text>
      <sha1>htv7otn748aw7o7f17an28dhsjtjts9</sha1>
    </revision>
  </page>
  <page>
    <title>About</title>
    <ns>0</ns>
    <id>16</id>
    <revision>
      <id>34</id>
      <timestamp>2013-06-27T15:19:05Z</timestamp>
      <contributor>
        <username>Fortasse</username>
        <id>1</id>
      </contributor>
      <comment>Created page with "{{Header}} &lt;!-- Copyright:     Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;    Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelano..."</comment>
      <origin>34</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="8279" sha1="h36pp53sbb7rzzjudlrbu0u58s5ycz1" xml:space="preserve">{{Header}}
&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;

&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;

= Introduction =

Whonix is an operating system that aims at preserving your privacy and anonymity. It helps you to use all kinds applications anonymously.

It is a complete operating-system designed to be used from your host operating system or a USB hard drive independently of the computer's original operating system. It is Free Software and based on [http://www.debian.org/ Debian GNU/Linux], Virtual Box and Tor.

Whonix comes with several built-in applications pre-configured with security in mind: web browser, irc client, word processing, etc.

= Anonymity online through Tor =

Whonix relies on the Tor anonymity network to protect your privacy online: all connections are forced through Tor, and direct (non-anonymous) connections are blocked.

Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Whonix is based on Debian, VirtualBox and Tor =

Remember, Whonix is based on Debian, KDE, VirtualBox, Tor and Tor Browser. It is nothing very special. To oversimplify it: Whonix is just a collection of configuration files. &lt;sup&gt;1&lt;/sup&gt;

No stripped down versions are used. For example, anything &lt;sup&gt;2&lt;/sup&gt; you can do with Debian GNU/Linux, you can do with Whonix as well. Most Debian GNU/Linux problems and questions with Whonix you may have can probable be solved the same way as for &amp;quot;vanilla&amp;quot; Debian. Q: &amp;quot;How do I install xrandr on Debian GNU/Linux?&amp;quot; A: &amp;quot;The same way you would with regular Debian GNU/Linux. Try ''apt-get install xrandr''. Nothing special. Same goes for Tor etc. Whonix doesn't break anything, it doesn't stop you from using obfuscated [https://sourceforge.net/p/whonix/wiki/Bridges/ bridges] or any other fancy stuff etc.

Tip: since Ubuntu is based on Debian, most things working on Ubuntu will also work on Debian. Most online help for Ubuntu also works for Debian.

{{note}} 1 Plus some shell extra shell scripts, a perl script (tails_htp) and a package selection. Whonix just puts everything together.

{{note}} 2 Actually only &amp;quot;almost&amp;quot; everything. Any limitations (beside bugs) will be Tor's responsibility. For example, UDP is not supported by Tor yet, therefore this won't work. 

= Cryptography =

Whonix contains some State-of-the-art cryptographic tools, a selection of tools to protect your data using strong encryption:

* Automatically encrypt with HTTPS all your communications to a number of major websites using [https://www.eff.org/https-everywhere HTTPS Everywhere], a Firefox extension developed by the [https://www.eff.org Electronic Frontier Foundation].
* [https://en.wikipedia.org/wiki/GNU_Privacy_Guard GNU Privacy Guard]

= Summary of what Whonix is =

== What is Whonix? ==

* Whonix is an Anonymous Operating System, that spoofs your own IP/location.
* Tor multiply encrypts the data sent over the Tor network. Neither your access provider nor Tor operators (except for the exit node) can see your plaintext data.
* Tor does regularly change the outgoing IP address.
* Whonix is an Anti-Censorship-Application that allows access to otherwise blocked Internet sites. Advanced users may configure their Whonix as a forwarding server in order to allow others access to the Tor network.
* Whonix is open source and free.
* Tor Browser in Whonix filters and anonymizes HTTP headers.
* For anonymous e-mails please see [E-Mail], i.e. use Mozilla Thunderbird with TorBirdy, because it provides special, additional data filtering in the email client itself.
* Whonix is available on all major systems (Windows, Mac OS X, Linux).

== What is Whonix not? ==

* Whonix does NOT make your PC's or router's IP address invisible. Your IP address is assigned to you by your ISP, and it is inalterable by third parties. You need the IP so that the Tor client may successfully connect to the Tor network on the Internet. When using Whonix, you are surfing through Tor servers on the Internet that all have their own separate IP address. The websites accessed by you will only see this respective outgoing address and not yours.
* Whonix does NOT accelerate Internet access. In fact by routing everything through the Tor network it becomes slower.
* Whonix is NOT The Tor Project. Tor is developed by The Tor Project.
* Whonix does not NOT use random &amp;quot;anonymous&amp;quot; proxies (e.g. those on lists of open proxies) to create an anonymous connection. This would be a totally unsafe method that does not lead to anonymization.
* Whonix is NO One-Click-Anonymization-Tool - something like that can and will not really ever exist! Prudence and knowledge remain maxim for Internet security.

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [Trust]] or not Trust Whonix,
* our [[Security Guide]] and [Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The &amp;quot;Summary of what Whonix is&amp;quot; chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}</text>
      <sha1>h36pp53sbb7rzzjudlrbu0u58s5ycz1</sha1>
    </revision>
    <revision>
      <id>330</id>
      <parentid>34</parentid>
      <timestamp>2013-07-03T22:17:58Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* What's next? */</comment>
      <origin>330</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="8282" sha1="ixh5xqkegppa6xryo3gyww6j0oligcg" xml:space="preserve">{{Header}}
&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;

&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;

= Introduction =

Whonix is an operating system that aims at preserving your privacy and anonymity. It helps you to use all kinds applications anonymously.

It is a complete operating-system designed to be used from your host operating system or a USB hard drive independently of the computer's original operating system. It is Free Software and based on [http://www.debian.org/ Debian GNU/Linux], Virtual Box and Tor.

Whonix comes with several built-in applications pre-configured with security in mind: web browser, irc client, word processing, etc.

= Anonymity online through Tor =

Whonix relies on the Tor anonymity network to protect your privacy online: all connections are forced through Tor, and direct (non-anonymous) connections are blocked.

Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Whonix is based on Debian, VirtualBox and Tor =

Remember, Whonix is based on Debian, KDE, VirtualBox, Tor and Tor Browser. It is nothing very special. To oversimplify it: Whonix is just a collection of configuration files. &lt;sup&gt;1&lt;/sup&gt;

No stripped down versions are used. For example, anything &lt;sup&gt;2&lt;/sup&gt; you can do with Debian GNU/Linux, you can do with Whonix as well. Most Debian GNU/Linux problems and questions with Whonix you may have can probable be solved the same way as for &amp;quot;vanilla&amp;quot; Debian. Q: &amp;quot;How do I install xrandr on Debian GNU/Linux?&amp;quot; A: &amp;quot;The same way you would with regular Debian GNU/Linux. Try ''apt-get install xrandr''. Nothing special. Same goes for Tor etc. Whonix doesn't break anything, it doesn't stop you from using obfuscated [https://sourceforge.net/p/whonix/wiki/Bridges/ bridges] or any other fancy stuff etc.

Tip: since Ubuntu is based on Debian, most things working on Ubuntu will also work on Debian. Most online help for Ubuntu also works for Debian.

{{note}} 1 Plus some shell extra shell scripts, a perl script (tails_htp) and a package selection. Whonix just puts everything together.

{{note}} 2 Actually only &amp;quot;almost&amp;quot; everything. Any limitations (beside bugs) will be Tor's responsibility. For example, UDP is not supported by Tor yet, therefore this won't work. 

= Cryptography =

Whonix contains some State-of-the-art cryptographic tools, a selection of tools to protect your data using strong encryption:

* Automatically encrypt with HTTPS all your communications to a number of major websites using [https://www.eff.org/https-everywhere HTTPS Everywhere], a Firefox extension developed by the [https://www.eff.org Electronic Frontier Foundation].
* [https://en.wikipedia.org/wiki/GNU_Privacy_Guard GNU Privacy Guard]

= Summary of what Whonix is =

== What is Whonix? ==

* Whonix is an Anonymous Operating System, that spoofs your own IP/location.
* Tor multiply encrypts the data sent over the Tor network. Neither your access provider nor Tor operators (except for the exit node) can see your plaintext data.
* Tor does regularly change the outgoing IP address.
* Whonix is an Anti-Censorship-Application that allows access to otherwise blocked Internet sites. Advanced users may configure their Whonix as a forwarding server in order to allow others access to the Tor network.
* Whonix is open source and free.
* Tor Browser in Whonix filters and anonymizes HTTP headers.
* For anonymous e-mails please see [E-Mail], i.e. use Mozilla Thunderbird with TorBirdy, because it provides special, additional data filtering in the email client itself.
* Whonix is available on all major systems (Windows, Mac OS X, Linux).

== What is Whonix not? ==

* Whonix does NOT make your PC's or router's IP address invisible. Your IP address is assigned to you by your ISP, and it is inalterable by third parties. You need the IP so that the Tor client may successfully connect to the Tor network on the Internet. When using Whonix, you are surfing through Tor servers on the Internet that all have their own separate IP address. The websites accessed by you will only see this respective outgoing address and not yours.
* Whonix does NOT accelerate Internet access. In fact by routing everything through the Tor network it becomes slower.
* Whonix is NOT The Tor Project. Tor is developed by The Tor Project.
* Whonix does not NOT use random &amp;quot;anonymous&amp;quot; proxies (e.g. those on lists of open proxies) to create an anonymous connection. This would be a totally unsafe method that does not lead to anonymization.
* Whonix is NO One-Click-Anonymization-Tool - something like that can and will not really ever exist! Prudence and knowledge remain maxim for Internet security.

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The &amp;quot;Summary of what Whonix is&amp;quot; chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}</text>
      <sha1>ixh5xqkegppa6xryo3gyww6j0oligcg</sha1>
    </revision>
    <revision>
      <id>810</id>
      <parentid>330</parentid>
      <timestamp>2013-07-10T17:50:07Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Acknowledgements, Credits, Related projects, Authorship */</comment>
      <origin>810</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="8301" sha1="8rn8jco1cppera5xwe9a218g8jppo5q" xml:space="preserve">{{Header}}
&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;

&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;

= Introduction =

Whonix is an operating system that aims at preserving your privacy and anonymity. It helps you to use all kinds applications anonymously.

It is a complete operating-system designed to be used from your host operating system or a USB hard drive independently of the computer's original operating system. It is Free Software and based on [http://www.debian.org/ Debian GNU/Linux], Virtual Box and Tor.

Whonix comes with several built-in applications pre-configured with security in mind: web browser, irc client, word processing, etc.

= Anonymity online through Tor =

Whonix relies on the Tor anonymity network to protect your privacy online: all connections are forced through Tor, and direct (non-anonymous) connections are blocked.

Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Whonix is based on Debian, VirtualBox and Tor =

Remember, Whonix is based on Debian, KDE, VirtualBox, Tor and Tor Browser. It is nothing very special. To oversimplify it: Whonix is just a collection of configuration files. &lt;sup&gt;1&lt;/sup&gt;

No stripped down versions are used. For example, anything &lt;sup&gt;2&lt;/sup&gt; you can do with Debian GNU/Linux, you can do with Whonix as well. Most Debian GNU/Linux problems and questions with Whonix you may have can probable be solved the same way as for &amp;quot;vanilla&amp;quot; Debian. Q: &amp;quot;How do I install xrandr on Debian GNU/Linux?&amp;quot; A: &amp;quot;The same way you would with regular Debian GNU/Linux. Try ''apt-get install xrandr''. Nothing special. Same goes for Tor etc. Whonix doesn't break anything, it doesn't stop you from using obfuscated [https://sourceforge.net/p/whonix/wiki/Bridges/ bridges] or any other fancy stuff etc.

Tip: since Ubuntu is based on Debian, most things working on Ubuntu will also work on Debian. Most online help for Ubuntu also works for Debian.

{{note}} 1 Plus some shell extra shell scripts, a perl script (tails_htp) and a package selection. Whonix just puts everything together.

{{note}} 2 Actually only &amp;quot;almost&amp;quot; everything. Any limitations (beside bugs) will be Tor's responsibility. For example, UDP is not supported by Tor yet, therefore this won't work. 

= Cryptography =

Whonix contains some State-of-the-art cryptographic tools, a selection of tools to protect your data using strong encryption:

* Automatically encrypt with HTTPS all your communications to a number of major websites using [https://www.eff.org/https-everywhere HTTPS Everywhere], a Firefox extension developed by the [https://www.eff.org Electronic Frontier Foundation].
* [https://en.wikipedia.org/wiki/GNU_Privacy_Guard GNU Privacy Guard]

= Summary of what Whonix is =

== What is Whonix? ==

* Whonix is an Anonymous Operating System, that spoofs your own IP/location.
* Tor multiply encrypts the data sent over the Tor network. Neither your access provider nor Tor operators (except for the exit node) can see your plaintext data.
* Tor does regularly change the outgoing IP address.
* Whonix is an Anti-Censorship-Application that allows access to otherwise blocked Internet sites. Advanced users may configure their Whonix as a forwarding server in order to allow others access to the Tor network.
* Whonix is open source and free.
* Tor Browser in Whonix filters and anonymizes HTTP headers.
* For anonymous e-mails please see [E-Mail], i.e. use Mozilla Thunderbird with TorBirdy, because it provides special, additional data filtering in the email client itself.
* Whonix is available on all major systems (Windows, Mac OS X, Linux).

== What is Whonix not? ==

* Whonix does NOT make your PC's or router's IP address invisible. Your IP address is assigned to you by your ISP, and it is inalterable by third parties. You need the IP so that the Tor client may successfully connect to the Tor network on the Internet. When using Whonix, you are surfing through Tor servers on the Internet that all have their own separate IP address. The websites accessed by you will only see this respective outgoing address and not yours.
* Whonix does NOT accelerate Internet access. In fact by routing everything through the Tor network it becomes slower.
* Whonix is NOT The Tor Project. Tor is developed by The Tor Project.
* Whonix does not NOT use random &amp;quot;anonymous&amp;quot; proxies (e.g. those on lists of open proxies) to create an anonymous connection. This would be a totally unsafe method that does not lead to anonymization.
* Whonix is NO One-Click-Anonymization-Tool - something like that can and will not really ever exist! Prudence and knowledge remain maxim for Internet security.

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

''Italic text''= Acknowledgements, Credits, Related projects, Authorship =

See [[Dev/Authorship]].

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The &amp;quot;Summary of what Whonix is&amp;quot; chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}</text>
      <sha1>8rn8jco1cppera5xwe9a218g8jppo5q</sha1>
    </revision>
    <revision>
      <id>811</id>
      <parentid>810</parentid>
      <timestamp>2013-07-10T17:50:41Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* What's next? */</comment>
      <origin>811</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="8286" sha1="fmbh0uim2s5c0ubyjz1fei3i8qfl5q0" xml:space="preserve">{{Header}}
&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;

&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;

= Introduction =

Whonix is an operating system that aims at preserving your privacy and anonymity. It helps you to use all kinds applications anonymously.

It is a complete operating-system designed to be used from your host operating system or a USB hard drive independently of the computer's original operating system. It is Free Software and based on [http://www.debian.org/ Debian GNU/Linux], Virtual Box and Tor.

Whonix comes with several built-in applications pre-configured with security in mind: web browser, irc client, word processing, etc.

= Anonymity online through Tor =

Whonix relies on the Tor anonymity network to protect your privacy online: all connections are forced through Tor, and direct (non-anonymous) connections are blocked.

Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Whonix is based on Debian, VirtualBox and Tor =

Remember, Whonix is based on Debian, KDE, VirtualBox, Tor and Tor Browser. It is nothing very special. To oversimplify it: Whonix is just a collection of configuration files. &lt;sup&gt;1&lt;/sup&gt;

No stripped down versions are used. For example, anything &lt;sup&gt;2&lt;/sup&gt; you can do with Debian GNU/Linux, you can do with Whonix as well. Most Debian GNU/Linux problems and questions with Whonix you may have can probable be solved the same way as for &amp;quot;vanilla&amp;quot; Debian. Q: &amp;quot;How do I install xrandr on Debian GNU/Linux?&amp;quot; A: &amp;quot;The same way you would with regular Debian GNU/Linux. Try ''apt-get install xrandr''. Nothing special. Same goes for Tor etc. Whonix doesn't break anything, it doesn't stop you from using obfuscated [https://sourceforge.net/p/whonix/wiki/Bridges/ bridges] or any other fancy stuff etc.

Tip: since Ubuntu is based on Debian, most things working on Ubuntu will also work on Debian. Most online help for Ubuntu also works for Debian.

{{note}} 1 Plus some shell extra shell scripts, a perl script (tails_htp) and a package selection. Whonix just puts everything together.

{{note}} 2 Actually only &amp;quot;almost&amp;quot; everything. Any limitations (beside bugs) will be Tor's responsibility. For example, UDP is not supported by Tor yet, therefore this won't work. 

= Cryptography =

Whonix contains some State-of-the-art cryptographic tools, a selection of tools to protect your data using strong encryption:

* Automatically encrypt with HTTPS all your communications to a number of major websites using [https://www.eff.org/https-everywhere HTTPS Everywhere], a Firefox extension developed by the [https://www.eff.org Electronic Frontier Foundation].
* [https://en.wikipedia.org/wiki/GNU_Privacy_Guard GNU Privacy Guard]

= Summary of what Whonix is =

== What is Whonix? ==

* Whonix is an Anonymous Operating System, that spoofs your own IP/location.
* Tor multiply encrypts the data sent over the Tor network. Neither your access provider nor Tor operators (except for the exit node) can see your plaintext data.
* Tor does regularly change the outgoing IP address.
* Whonix is an Anti-Censorship-Application that allows access to otherwise blocked Internet sites. Advanced users may configure their Whonix as a forwarding server in order to allow others access to the Tor network.
* Whonix is open source and free.
* Tor Browser in Whonix filters and anonymizes HTTP headers.
* For anonymous e-mails please see [E-Mail], i.e. use Mozilla Thunderbird with TorBirdy, because it provides special, additional data filtering in the email client itself.
* Whonix is available on all major systems (Windows, Mac OS X, Linux).

== What is Whonix not? ==

* Whonix does NOT make your PC's or router's IP address invisible. Your IP address is assigned to you by your ISP, and it is inalterable by third parties. You need the IP so that the Tor client may successfully connect to the Tor network on the Internet. When using Whonix, you are surfing through Tor servers on the Internet that all have their own separate IP address. The websites accessed by you will only see this respective outgoing address and not yours.
* Whonix does NOT accelerate Internet access. In fact by routing everything through the Tor network it becomes slower.
* Whonix is NOT The Tor Project. Tor is developed by The Tor Project.
* Whonix does not NOT use random &amp;quot;anonymous&amp;quot; proxies (e.g. those on lists of open proxies) to create an anonymous connection. This would be a totally unsafe method that does not lead to anonymization.
* Whonix is NO One-Click-Anonymization-Tool - something like that can and will not really ever exist! Prudence and knowledge remain maxim for Internet security.

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Dev/Authorship]].

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The &amp;quot;Summary of what Whonix is&amp;quot; chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}</text>
      <sha1>fmbh0uim2s5c0ubyjz1fei3i8qfl5q0</sha1>
    </revision>
    <revision>
      <id>993</id>
      <parentid>811</parentid>
      <timestamp>2013-07-11T23:11:48Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>/* Whonix is based on Debian, VirtualBox and Tor */</comment>
      <origin>993</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="8240" sha1="0s5c5ni336cfer6gnzoxdt6ob8q616z" xml:space="preserve">{{Header}}
&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;

&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;

= Introduction =

Whonix is an operating system that aims at preserving your privacy and anonymity. It helps you to use all kinds applications anonymously.

It is a complete operating-system designed to be used from your host operating system or a USB hard drive independently of the computer's original operating system. It is Free Software and based on [http://www.debian.org/ Debian GNU/Linux], Virtual Box and Tor.

Whonix comes with several built-in applications pre-configured with security in mind: web browser, irc client, word processing, etc.

= Anonymity online through Tor =

Whonix relies on the Tor anonymity network to protect your privacy online: all connections are forced through Tor, and direct (non-anonymous) connections are blocked.

Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Whonix is based on Debian, VirtualBox and Tor =

Remember, Whonix is based on Debian, KDE, VirtualBox, Tor and Tor Browser. It is nothing very special. To oversimplify it: Whonix is just a collection of configuration files. &lt;sup&gt;1&lt;/sup&gt;

No stripped down versions are used. For example, anything &lt;sup&gt;2&lt;/sup&gt; you can do with Debian GNU/Linux, you can do with Whonix as well. Most Debian GNU/Linux problems and questions with Whonix you may have can probable be solved the same way as for &amp;quot;vanilla&amp;quot; Debian. Q: &amp;quot;How do I install xrandr on Debian GNU/Linux?&amp;quot; A: &amp;quot;The same way you would with regular Debian GNU/Linux. Try ''apt-get install xrandr''. Nothing special. Same goes for Tor etc. Whonix doesn't break anything, it doesn't stop you from using obfuscated [[Bridges]] or any other fancy stuff etc.

Tip: since Ubuntu is based on Debian, most things working on Ubuntu will also work on Debian. Most online help for Ubuntu also works for Debian.

{{note}} 1 Plus some shell extra shell scripts, a perl script (tails_htp) and a package selection. Whonix just puts everything together.

{{note}} 2 Actually only &amp;quot;almost&amp;quot; everything. Any limitations (beside bugs) will be Tor's responsibility. For example, UDP is not supported by Tor yet, therefore this won't work.

= Cryptography =

Whonix contains some State-of-the-art cryptographic tools, a selection of tools to protect your data using strong encryption:

* Automatically encrypt with HTTPS all your communications to a number of major websites using [https://www.eff.org/https-everywhere HTTPS Everywhere], a Firefox extension developed by the [https://www.eff.org Electronic Frontier Foundation].
* [https://en.wikipedia.org/wiki/GNU_Privacy_Guard GNU Privacy Guard]

= Summary of what Whonix is =

== What is Whonix? ==

* Whonix is an Anonymous Operating System, that spoofs your own IP/location.
* Tor multiply encrypts the data sent over the Tor network. Neither your access provider nor Tor operators (except for the exit node) can see your plaintext data.
* Tor does regularly change the outgoing IP address.
* Whonix is an Anti-Censorship-Application that allows access to otherwise blocked Internet sites. Advanced users may configure their Whonix as a forwarding server in order to allow others access to the Tor network.
* Whonix is open source and free.
* Tor Browser in Whonix filters and anonymizes HTTP headers.
* For anonymous e-mails please see [E-Mail], i.e. use Mozilla Thunderbird with TorBirdy, because it provides special, additional data filtering in the email client itself.
* Whonix is available on all major systems (Windows, Mac OS X, Linux).

== What is Whonix not? ==

* Whonix does NOT make your PC's or router's IP address invisible. Your IP address is assigned to you by your ISP, and it is inalterable by third parties. You need the IP so that the Tor client may successfully connect to the Tor network on the Internet. When using Whonix, you are surfing through Tor servers on the Internet that all have their own separate IP address. The websites accessed by you will only see this respective outgoing address and not yours.
* Whonix does NOT accelerate Internet access. In fact by routing everything through the Tor network it becomes slower.
* Whonix is NOT The Tor Project. Tor is developed by The Tor Project.
* Whonix does not NOT use random &amp;quot;anonymous&amp;quot; proxies (e.g. those on lists of open proxies) to create an anonymous connection. This would be a totally unsafe method that does not lead to anonymization.
* Whonix is NO One-Click-Anonymization-Tool - something like that can and will not really ever exist! Prudence and knowledge remain maxim for Internet security.

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Dev/Authorship]].

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The &amp;quot;Summary of what Whonix is&amp;quot; chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}</text>
      <sha1>0s5c5ni336cfer6gnzoxdt6ob8q616z</sha1>
    </revision>
    <revision>
      <id>994</id>
      <parentid>993</parentid>
      <timestamp>2013-07-11T23:12:29Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <origin>994</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="8185" sha1="ptymv9g43wolvz9n3yj907e6butdqna" xml:space="preserve">{{Header}}
&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;

&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;

= Introduction =

Whonix is an operating system that aims at preserving your privacy and anonymity. It helps you to use all kinds applications anonymously.

It is a complete operating-system designed to be used from your host operating system or a USB hard drive independently of the computer's original operating system. It is Free Software and based on [http://www.debian.org/ Debian GNU/Linux], Virtual Box and Tor.

Whonix comes with several built-in applications pre-configured with security in mind: web browser, irc client, word processing, etc.

= Anonymity online through Tor =

Whonix relies on the Tor anonymity network to protect your privacy online: all connections are forced through Tor, and direct (non-anonymous) connections are blocked.

Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Whonix is based on Debian, VirtualBox and Tor =

Remember, Whonix is based on Debian, KDE, VirtualBox, Tor and Tor Browser. It is nothing very special. To oversimplify it: Whonix is just a collection of configuration files. &lt;sup&gt;1&lt;/sup&gt;

No stripped down versions are used. For example, anything &lt;sup&gt;2&lt;/sup&gt; you can do with Debian GNU/Linux, you can do with Whonix as well. Most Debian GNU/Linux problems and questions with Whonix you may have can probable be solved the same way as for "vanilla" Debian. Q: "How do I install xrandr on Debian GNU/Linux?" A: "The same way you would with regular Debian GNU/Linux. Try ''apt-get install xrandr''. Nothing special. Same goes for Tor etc. Whonix doesn't break anything, it doesn't stop you from using obfuscated [[Bridges]] or any other fancy stuff etc.

Tip: since Ubuntu is based on Debian, most things working on Ubuntu will also work on Debian. Most online help for Ubuntu also works for Debian.

{{note}} 1 Plus some shell extra shell scripts, a perl script (tails_htp) and a package selection. Whonix just puts everything together.

{{note}} 2 Actually only "almost" everything. Any limitations (beside bugs) will be Tor's responsibility. For example, UDP is not supported by Tor yet, therefore this won't work.

= Cryptography =

Whonix contains some State-of-the-art cryptographic tools, a selection of tools to protect your data using strong encryption:

* Automatically encrypt with HTTPS all your communications to a number of major websites using [https://www.eff.org/https-everywhere HTTPS Everywhere], a Firefox extension developed by the [https://www.eff.org Electronic Frontier Foundation].
* [https://en.wikipedia.org/wiki/GNU_Privacy_Guard GNU Privacy Guard]

= Summary of what Whonix is =

== What is Whonix? ==

* Whonix is an Anonymous Operating System, that spoofs your own IP/location.
* Tor multiply encrypts the data sent over the Tor network. Neither your access provider nor Tor operators (except for the exit node) can see your plaintext data.
* Tor does regularly change the outgoing IP address.
* Whonix is an Anti-Censorship-Application that allows access to otherwise blocked Internet sites. Advanced users may configure their Whonix as a forwarding server in order to allow others access to the Tor network.
* Whonix is open source and free.
* Tor Browser in Whonix filters and anonymizes HTTP headers.
* For anonymous e-mails please see [E-Mail], i.e. use Mozilla Thunderbird with TorBirdy, because it provides special, additional data filtering in the email client itself.
* Whonix is available on all major systems (Windows, Mac OS X, Linux).

== What is Whonix not? ==

* Whonix does NOT make your PC's or router's IP address invisible. Your IP address is assigned to you by your ISP, and it is inalterable by third parties. You need the IP so that the Tor client may successfully connect to the Tor network on the Internet. When using Whonix, you are surfing through Tor servers on the Internet that all have their own separate IP address. The websites accessed by you will only see this respective outgoing address and not yours.
* Whonix does NOT accelerate Internet access. In fact by routing everything through the Tor network it becomes slower.
* Whonix is NOT The Tor Project. Tor is developed by The Tor Project.
* Whonix does not NOT use random "anonymous" proxies (e.g. those on lists of open proxies) to create an anonymous connection. This would be a totally unsafe method that does not lead to anonymization.
* Whonix is NO One-Click-Anonymization-Tool - something like that can and will not really ever exist! Prudence and knowledge remain maxim for Internet security.

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Dev/Authorship]].

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}</text>
      <sha1>ptymv9g43wolvz9n3yj907e6butdqna</sha1>
    </revision>
    <revision>
      <id>996</id>
      <parentid>994</parentid>
      <timestamp>2013-07-11T23:19:20Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>996</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="8213" sha1="sj89sl73lrv6l2xf4inw01f63tz1shr" xml:space="preserve">{{Header}}
&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;

&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;

= Introduction =

Whonix is an operating system that aims at preserving your privacy and anonymity. It helps you to use all kinds applications anonymously.

It is a complete operating-system designed to be used from your host operating system or a USB hard drive independently of the computer's original operating system. It is Free Software and based on [http://www.debian.org/ Debian GNU/Linux], Virtual Box and Tor.

Whonix comes with several built-in applications pre-configured with security in mind: web browser, irc client, word processing, etc.

= Anonymity online through Tor =

Whonix relies on the Tor anonymity network to protect your privacy online: all connections are forced through Tor, and direct (non-anonymous) connections are blocked.

Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Whonix is based on Debian, VirtualBox and Tor =

Remember, Whonix is based on Debian, KDE, VirtualBox, Tor and Tor Browser. It is nothing very special. To oversimplify it: Whonix is just a collection of configuration files. &lt;sup&gt;1&lt;/sup&gt;

No stripped down versions are used. For example, anything &lt;sup&gt;2&lt;/sup&gt; you can do with Debian GNU/Linux, you can do with Whonix as well. Most Debian GNU/Linux problems and questions with Whonix you may have can probable be solved the same way as for "vanilla" Debian. Q: "How do I install xrandr on Debian GNU/Linux?" A: "The same way you would with regular Debian GNU/Linux. Try ''apt-get install xrandr''. Nothing special. Same goes for Tor etc. Whonix doesn't break anything, it doesn't stop you from using obfuscated [[Bridges]] or any other fancy stuff etc.

Tip: since Ubuntu is based on Debian, most things working on Ubuntu will also work on Debian. Most online help for Ubuntu also works for Debian.

{{note}} 1 Plus some shell extra shell scripts, a perl script (tails_htp) and a package selection. Whonix just puts everything together.

{{note}} 2 Actually only "almost" everything. Any limitations (beside bugs) will be Tor's responsibility. For example, UDP is not supported by Tor yet, therefore this won't work.

= Cryptography =

Whonix contains some State-of-the-art cryptographic tools, a selection of tools to protect your data using strong encryption:

* Automatically encrypt with HTTPS all your communications to a number of major websites using [https://www.eff.org/https-everywhere HTTPS Everywhere], a Firefox extension developed by the [https://www.eff.org Electronic Frontier Foundation].
* [https://en.wikipedia.org/wiki/GNU_Privacy_Guard GNU Privacy Guard]

= Summary of what Whonix is =

== What is Whonix? ==

* Whonix is an Anonymous Operating System, that spoofs your own IP/location.
* Tor multiply encrypts the data sent over the Tor network. Neither your access provider nor Tor operators (except for the exit node) can see your plaintext data.
* Tor does regularly change the outgoing IP address.
* Whonix is an Anti-Censorship-Application that allows access to otherwise blocked Internet sites. Advanced users may configure their Whonix as a forwarding server in order to allow others access to the Tor network.
* Whonix is open source and free.
* Tor Browser in Whonix filters and anonymizes HTTP headers.
* For anonymous e-mails please see [E-Mail], i.e. use Mozilla Thunderbird with TorBirdy, because it provides special, additional data filtering in the email client itself.
* Whonix is available on all major systems (Windows, Mac OS X, Linux).

== What is Whonix not? ==

* Whonix does NOT make your PC's or router's IP address invisible. Your IP address is assigned to you by your ISP, and it is inalterable by third parties. You need the IP so that the Tor client may successfully connect to the Tor network on the Internet. When using Whonix, you are surfing through Tor servers on the Internet that all have their own separate IP address. The websites accessed by you will only see this respective outgoing address and not yours.
* Whonix does NOT accelerate Internet access. In fact by routing everything through the Tor network it becomes slower.
* Whonix is NOT The Tor Project. Tor is developed by The Tor Project.
* Whonix does not NOT use random "anonymous" proxies (e.g. those on lists of open proxies) to create an anonymous connection. This would be a totally unsafe method that does not lead to anonymization.
* Whonix is NO One-Click-Anonymization-Tool - something like that can and will not really ever exist! Prudence and knowledge remain maxim for Internet security.

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Dev/Authorship]].

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

[[Category:Documentation]]

{{Footer}}</text>
      <sha1>sj89sl73lrv6l2xf4inw01f63tz1shr</sha1>
    </revision>
    <revision>
      <id>1139</id>
      <parentid>996</parentid>
      <timestamp>2013-07-12T15:58:34Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>/* Introduction */ Restructured; edited for style; added ref links</comment>
      <origin>1139</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="8296" sha1="i2u9cgnmuzdj4ofqyidb4cja4bzn92h" xml:space="preserve">{{Header}}
&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;

&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;

= Introduction =

Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A web browser, IRC client, word processer, and more come pre-configured with security in mind.

It is a complete operating system designed to be used inside a host operating system, such as your computer's currently installed OS or an OS installed independently on an external drive. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and Virtual Box&lt;ref&gt;https://en.wikipedia.org/wiki/VirtualBox&lt;/ref&gt;.

= Anonymity online through Tor =

Whonix relies on the Tor anonymity network to protect your privacy online: all connections are forced through Tor, and direct (non-anonymous) connections are blocked.

Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Whonix is based on Debian, VirtualBox and Tor =

Remember, Whonix is based on Debian, KDE, VirtualBox, Tor and Tor Browser. It is nothing very special. To oversimplify it: Whonix is just a collection of configuration files. &lt;sup&gt;1&lt;/sup&gt;

No stripped down versions are used. For example, anything &lt;sup&gt;2&lt;/sup&gt; you can do with Debian GNU/Linux, you can do with Whonix as well. Most Debian GNU/Linux problems and questions with Whonix you may have can probable be solved the same way as for "vanilla" Debian. Q: "How do I install xrandr on Debian GNU/Linux?" A: "The same way you would with regular Debian GNU/Linux. Try ''apt-get install xrandr''. Nothing special. Same goes for Tor etc. Whonix doesn't break anything, it doesn't stop you from using obfuscated [[Bridges]] or any other fancy stuff etc.

Tip: since Ubuntu is based on Debian, most things working on Ubuntu will also work on Debian. Most online help for Ubuntu also works for Debian.

{{note}} 1 Plus some shell extra shell scripts, a perl script (tails_htp) and a package selection. Whonix just puts everything together.

{{note}} 2 Actually only "almost" everything. Any limitations (beside bugs) will be Tor's responsibility. For example, UDP is not supported by Tor yet, therefore this won't work.

= Cryptography =

Whonix contains some State-of-the-art cryptographic tools, a selection of tools to protect your data using strong encryption:

* Automatically encrypt with HTTPS all your communications to a number of major websites using [https://www.eff.org/https-everywhere HTTPS Everywhere], a Firefox extension developed by the [https://www.eff.org Electronic Frontier Foundation].
* [https://en.wikipedia.org/wiki/GNU_Privacy_Guard GNU Privacy Guard]

= Summary of what Whonix is =

== What is Whonix? ==

* Whonix is an Anonymous Operating System, that spoofs your own IP/location.
* Tor multiply encrypts the data sent over the Tor network. Neither your access provider nor Tor operators (except for the exit node) can see your plaintext data.
* Tor does regularly change the outgoing IP address.
* Whonix is an Anti-Censorship-Application that allows access to otherwise blocked Internet sites. Advanced users may configure their Whonix as a forwarding server in order to allow others access to the Tor network.
* Whonix is open source and free.
* Tor Browser in Whonix filters and anonymizes HTTP headers.
* For anonymous e-mails please see [E-Mail], i.e. use Mozilla Thunderbird with TorBirdy, because it provides special, additional data filtering in the email client itself.
* Whonix is available on all major systems (Windows, Mac OS X, Linux).

== What is Whonix not? ==

* Whonix does NOT make your PC's or router's IP address invisible. Your IP address is assigned to you by your ISP, and it is inalterable by third parties. You need the IP so that the Tor client may successfully connect to the Tor network on the Internet. When using Whonix, you are surfing through Tor servers on the Internet that all have their own separate IP address. The websites accessed by you will only see this respective outgoing address and not yours.
* Whonix does NOT accelerate Internet access. In fact by routing everything through the Tor network it becomes slower.
* Whonix is NOT The Tor Project. Tor is developed by The Tor Project.
* Whonix does not NOT use random "anonymous" proxies (e.g. those on lists of open proxies) to create an anonymous connection. This would be a totally unsafe method that does not lead to anonymization.
* Whonix is NO One-Click-Anonymization-Tool - something like that can and will not really ever exist! Prudence and knowledge remain maxim for Internet security.

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Dev/Authorship]].

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

[[Category:Documentation]]

{{Footer}}</text>
      <sha1>i2u9cgnmuzdj4ofqyidb4cja4bzn92h</sha1>
    </revision>
    <revision>
      <id>1236</id>
      <parentid>1139</parentid>
      <timestamp>2013-07-12T17:56:26Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>1236</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="8293" sha1="ad8gdxahdf7x1ladowbzyhujd78er7u" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A web browser, IRC client, word processer, and more come pre-configured with security in mind.

It is a complete operating system designed to be used inside a host operating system, such as your computer's currently installed OS or an OS installed independently on an external drive. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and Virtual Box&lt;ref&gt;https://en.wikipedia.org/wiki/VirtualBox&lt;/ref&gt;.

= Anonymity online through Tor =

Whonix relies on the Tor anonymity network to protect your privacy online: all connections are forced through Tor, and direct (non-anonymous) connections are blocked.

Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Whonix is based on Debian, VirtualBox and Tor =

Remember, Whonix is based on Debian, KDE, VirtualBox, Tor and Tor Browser. It is nothing very special. To oversimplify it: Whonix is just a collection of configuration files. &lt;sup&gt;1&lt;/sup&gt;

No stripped down versions are used. For example, anything &lt;sup&gt;2&lt;/sup&gt; you can do with Debian GNU/Linux, you can do with Whonix as well. Most Debian GNU/Linux problems and questions with Whonix you may have can probable be solved the same way as for "vanilla" Debian. Q: "How do I install xrandr on Debian GNU/Linux?" A: "The same way you would with regular Debian GNU/Linux. Try ''apt-get install xrandr''. Nothing special. Same goes for Tor etc. Whonix doesn't break anything, it doesn't stop you from using obfuscated [[Bridges]] or any other fancy stuff etc.

Tip: since Ubuntu is based on Debian, most things working on Ubuntu will also work on Debian. Most online help for Ubuntu also works for Debian.

{{note}} 1 Plus some shell extra shell scripts, a perl script (tails_htp) and a package selection. Whonix just puts everything together.

{{note}} 2 Actually only "almost" everything. Any limitations (beside bugs) will be Tor's responsibility. For example, UDP is not supported by Tor yet, therefore this won't work.

= Cryptography =

Whonix contains some State-of-the-art cryptographic tools, a selection of tools to protect your data using strong encryption:

* Automatically encrypt with HTTPS all your communications to a number of major websites using [https://www.eff.org/https-everywhere HTTPS Everywhere], a Firefox extension developed by the [https://www.eff.org Electronic Frontier Foundation].
* [https://en.wikipedia.org/wiki/GNU_Privacy_Guard GNU Privacy Guard]

= Summary of what Whonix is =

== What is Whonix? ==

* Whonix is an Anonymous Operating System, that spoofs your own IP/location.
* Tor multiply encrypts the data sent over the Tor network. Neither your access provider nor Tor operators (except for the exit node) can see your plaintext data.
* Tor does regularly change the outgoing IP address.
* Whonix is an Anti-Censorship-Application that allows access to otherwise blocked Internet sites. Advanced users may configure their Whonix as a forwarding server in order to allow others access to the Tor network.
* Whonix is open source and free.
* Tor Browser in Whonix filters and anonymizes HTTP headers.
* For anonymous e-mails please see [E-Mail], i.e. use Mozilla Thunderbird with TorBirdy, because it provides special, additional data filtering in the email client itself.
* Whonix is available on all major systems (Windows, Mac OS X, Linux).

== What is Whonix not? ==

* Whonix does NOT make your PC's or router's IP address invisible. Your IP address is assigned to you by your ISP, and it is inalterable by third parties. You need the IP so that the Tor client may successfully connect to the Tor network on the Internet. When using Whonix, you are surfing through Tor servers on the Internet that all have their own separate IP address. The websites accessed by you will only see this respective outgoing address and not yours.
* Whonix does NOT accelerate Internet access. In fact by routing everything through the Tor network it becomes slower.
* Whonix is NOT The Tor Project. Tor is developed by The Tor Project.
* Whonix does not NOT use random "anonymous" proxies (e.g. those on lists of open proxies) to create an anonymous connection. This would be a totally unsafe method that does not lead to anonymization.
* Whonix is NO One-Click-Anonymization-Tool - something like that can and will not really ever exist! Prudence and knowledge remain maxim for Internet security.

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Dev/Authorship]].

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>ad8gdxahdf7x1ladowbzyhujd78er7u</sha1>
    </revision>
    <revision>
      <id>1237</id>
      <parentid>1236</parentid>
      <timestamp>2013-07-12T17:58:40Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>1237</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="8326" sha1="dtazsr4fegwwfmb485ovnqgl08zax9l" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A web browser, IRC client, word processer, and more come pre-configured with security in mind.

It is a complete operating system designed to be used inside a host operating system, such as your computer's currently installed OS or an OS installed independently on an external drive. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and Virtual Box&lt;ref&gt;https://en.wikipedia.org/wiki/VirtualBox&lt;/ref&gt;.

= Anonymity online through Tor =

Whonix relies on the Tor anonymity network to protect your privacy online: all connections are forced through Tor, and direct (non-anonymous) connections are blocked.

Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Whonix is based on Debian, VirtualBox and Tor =

Remember, Whonix is based on Debian, KDE, VirtualBox, Tor and Tor Browser. It is nothing very special. To oversimplify it: Whonix is just a collection of configuration files. &lt;ref&gt;{{note}} Plus some shell extra shell scripts, a perl script (tails_htp) and a package selection. Whonix just puts everything together.&lt;/ref&gt;

No stripped down versions are used. For example, anything &lt;ref&gt;{{note}} Actually only "almost" everything. Any limitations (beside bugs) will be Tor's responsibility. For example, UDP is not supported by Tor yet, therefore this won't work.&lt;/ref&gt; you can do with Debian GNU/Linux, you can do with Whonix as well. Most Debian GNU/Linux problems and questions with Whonix you may have can probable be solved the same way as for "vanilla" Debian. Q: "How do I install xrandr on Debian GNU/Linux?" A: "The same way you would with regular Debian GNU/Linux. Try ''apt-get install xrandr''. Nothing special. Same goes for Tor etc. Whonix doesn't break anything, it doesn't stop you from using obfuscated [[Bridges]] or any other fancy stuff etc.

Tip: since Ubuntu is based on Debian, most things working on Ubuntu will also work on Debian. Most online help for Ubuntu also works for Debian.

= Cryptography =

Whonix contains some State-of-the-art cryptographic tools, a selection of tools to protect your data using strong encryption:

* Automatically encrypt with HTTPS all your communications to a number of major websites using [https://www.eff.org/https-everywhere HTTPS Everywhere], a Firefox extension developed by the [https://www.eff.org Electronic Frontier Foundation].
* [https://en.wikipedia.org/wiki/GNU_Privacy_Guard GNU Privacy Guard]

= Summary of what Whonix is =

== What is Whonix? ==

* Whonix is an Anonymous Operating System, that spoofs your own IP/location.
* Tor multiply encrypts the data sent over the Tor network. Neither your access provider nor Tor operators (except for the exit node) can see your plaintext data.
* Tor does regularly change the outgoing IP address.
* Whonix is an Anti-Censorship-Application that allows access to otherwise blocked Internet sites. Advanced users may configure their Whonix as a forwarding server in order to allow others access to the Tor network.
* Whonix is open source and free.
* Tor Browser in Whonix filters and anonymizes HTTP headers.
* For anonymous e-mails please see [E-Mail], i.e. use Mozilla Thunderbird with TorBirdy, because it provides special, additional data filtering in the email client itself.
* Whonix is available on all major systems (Windows, Mac OS X, Linux).

== What is Whonix not? ==

* Whonix does NOT make your PC's or router's IP address invisible. Your IP address is assigned to you by your ISP, and it is inalterable by third parties. You need the IP so that the Tor client may successfully connect to the Tor network on the Internet. When using Whonix, you are surfing through Tor servers on the Internet that all have their own separate IP address. The websites accessed by you will only see this respective outgoing address and not yours.
* Whonix does NOT accelerate Internet access. In fact by routing everything through the Tor network it becomes slower.
* Whonix is NOT The Tor Project. Tor is developed by The Tor Project.
* Whonix does not NOT use random "anonymous" proxies (e.g. those on lists of open proxies) to create an anonymous connection. This would be a totally unsafe method that does not lead to anonymization.
* Whonix is NO One-Click-Anonymization-Tool - something like that can and will not really ever exist! Prudence and knowledge remain maxim for Internet security.

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Dev/Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>dtazsr4fegwwfmb485ovnqgl08zax9l</sha1>
    </revision>
    <revision>
      <id>1238</id>
      <parentid>1237</parentid>
      <timestamp>2013-07-12T17:59:34Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* What is Whonix? */</comment>
      <origin>1238</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="8328" sha1="j1fi5kstrkdp3mpo73k41zouol818vt" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A web browser, IRC client, word processer, and more come pre-configured with security in mind.

It is a complete operating system designed to be used inside a host operating system, such as your computer's currently installed OS or an OS installed independently on an external drive. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and Virtual Box&lt;ref&gt;https://en.wikipedia.org/wiki/VirtualBox&lt;/ref&gt;.

= Anonymity online through Tor =

Whonix relies on the Tor anonymity network to protect your privacy online: all connections are forced through Tor, and direct (non-anonymous) connections are blocked.

Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Whonix is based on Debian, VirtualBox and Tor =

Remember, Whonix is based on Debian, KDE, VirtualBox, Tor and Tor Browser. It is nothing very special. To oversimplify it: Whonix is just a collection of configuration files. &lt;ref&gt;{{note}} Plus some shell extra shell scripts, a perl script (tails_htp) and a package selection. Whonix just puts everything together.&lt;/ref&gt;

No stripped down versions are used. For example, anything &lt;ref&gt;{{note}} Actually only "almost" everything. Any limitations (beside bugs) will be Tor's responsibility. For example, UDP is not supported by Tor yet, therefore this won't work.&lt;/ref&gt; you can do with Debian GNU/Linux, you can do with Whonix as well. Most Debian GNU/Linux problems and questions with Whonix you may have can probable be solved the same way as for "vanilla" Debian. Q: "How do I install xrandr on Debian GNU/Linux?" A: "The same way you would with regular Debian GNU/Linux. Try ''apt-get install xrandr''. Nothing special. Same goes for Tor etc. Whonix doesn't break anything, it doesn't stop you from using obfuscated [[Bridges]] or any other fancy stuff etc.

Tip: since Ubuntu is based on Debian, most things working on Ubuntu will also work on Debian. Most online help for Ubuntu also works for Debian.

= Cryptography =

Whonix contains some State-of-the-art cryptographic tools, a selection of tools to protect your data using strong encryption:

* Automatically encrypt with HTTPS all your communications to a number of major websites using [https://www.eff.org/https-everywhere HTTPS Everywhere], a Firefox extension developed by the [https://www.eff.org Electronic Frontier Foundation].
* [https://en.wikipedia.org/wiki/GNU_Privacy_Guard GNU Privacy Guard]

= Summary of what Whonix is =

== What is Whonix? ==

* Whonix is an Anonymous Operating System, that spoofs your own IP/location.
* Tor multiply encrypts the data sent over the Tor network. Neither your access provider nor Tor operators (except for the exit node) can see your plaintext data.
* Tor does regularly change the outgoing IP address.
* Whonix is an Anti-Censorship-Application that allows access to otherwise blocked Internet sites. Advanced users may configure their Whonix as a forwarding server in order to allow others access to the Tor network.
* Whonix is open source and free.
* Tor Browser in Whonix filters and anonymizes HTTP headers.
* For anonymous e-mails please see [[E-Mail]], i.e. use Mozilla Thunderbird with TorBirdy, because it provides special, additional data filtering in the email client itself.
* Whonix is available on all major systems (Windows, Mac OS X, Linux).

== What is Whonix not? ==

* Whonix does NOT make your PC's or router's IP address invisible. Your IP address is assigned to you by your ISP, and it is inalterable by third parties. You need the IP so that the Tor client may successfully connect to the Tor network on the Internet. When using Whonix, you are surfing through Tor servers on the Internet that all have their own separate IP address. The websites accessed by you will only see this respective outgoing address and not yours.
* Whonix does NOT accelerate Internet access. In fact by routing everything through the Tor network it becomes slower.
* Whonix is NOT The Tor Project. Tor is developed by The Tor Project.
* Whonix does not NOT use random "anonymous" proxies (e.g. those on lists of open proxies) to create an anonymous connection. This would be a totally unsafe method that does not lead to anonymization.
* Whonix is NO One-Click-Anonymization-Tool - something like that can and will not really ever exist! Prudence and knowledge remain maxim for Internet security.

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Dev/Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>j1fi5kstrkdp3mpo73k41zouol818vt</sha1>
    </revision>
    <revision>
      <id>1261</id>
      <parentid>1238</parentid>
      <timestamp>2013-07-12T22:02:59Z</timestamp>
      <contributor>
        <username>JasonJAyalaP</username>
        <id>9</id>
      </contributor>
      <comment>/* Anonymity online through Tor */ Rephrased for clarity (direct vs routed vs non-anonymous); replaced "privacy" with more technically accurate (in the case of Tor) term "anonymity"</comment>
      <origin>1261</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="8286" sha1="f7p0wicy06626jtwxzt3w88wtrukknu" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A web browser, IRC client, word processer, and more come pre-configured with security in mind.

It is a complete operating system designed to be used inside a host operating system, such as your computer's currently installed OS or an OS installed independently on an external drive. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and Virtual Box&lt;ref&gt;https://en.wikipedia.org/wiki/VirtualBox&lt;/ref&gt;.

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through Tor or blocked.

Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Whonix is based on Debian, VirtualBox and Tor =

Remember, Whonix is based on Debian, KDE, VirtualBox, Tor and Tor Browser. It is nothing very special. To oversimplify it: Whonix is just a collection of configuration files. &lt;ref&gt;{{note}} Plus some shell extra shell scripts, a perl script (tails_htp) and a package selection. Whonix just puts everything together.&lt;/ref&gt;

No stripped down versions are used. For example, anything &lt;ref&gt;{{note}} Actually only "almost" everything. Any limitations (beside bugs) will be Tor's responsibility. For example, UDP is not supported by Tor yet, therefore this won't work.&lt;/ref&gt; you can do with Debian GNU/Linux, you can do with Whonix as well. Most Debian GNU/Linux problems and questions with Whonix you may have can probable be solved the same way as for "vanilla" Debian. Q: "How do I install xrandr on Debian GNU/Linux?" A: "The same way you would with regular Debian GNU/Linux. Try ''apt-get install xrandr''. Nothing special. Same goes for Tor etc. Whonix doesn't break anything, it doesn't stop you from using obfuscated [[Bridges]] or any other fancy stuff etc.

Tip: since Ubuntu is based on Debian, most things working on Ubuntu will also work on Debian. Most online help for Ubuntu also works for Debian.

= Cryptography =

Whonix contains some State-of-the-art cryptographic tools, a selection of tools to protect your data using strong encryption:

* Automatically encrypt with HTTPS all your communications to a number of major websites using [https://www.eff.org/https-everywhere HTTPS Everywhere], a Firefox extension developed by the [https://www.eff.org Electronic Frontier Foundation].
* [https://en.wikipedia.org/wiki/GNU_Privacy_Guard GNU Privacy Guard]

= Summary of what Whonix is =

== What is Whonix? ==

* Whonix is an Anonymous Operating System, that spoofs your own IP/location.
* Tor multiply encrypts the data sent over the Tor network. Neither your access provider nor Tor operators (except for the exit node) can see your plaintext data.
* Tor does regularly change the outgoing IP address.
* Whonix is an Anti-Censorship-Application that allows access to otherwise blocked Internet sites. Advanced users may configure their Whonix as a forwarding server in order to allow others access to the Tor network.
* Whonix is open source and free.
* Tor Browser in Whonix filters and anonymizes HTTP headers.
* For anonymous e-mails please see [[E-Mail]], i.e. use Mozilla Thunderbird with TorBirdy, because it provides special, additional data filtering in the email client itself.
* Whonix is available on all major systems (Windows, Mac OS X, Linux).

== What is Whonix not? ==

* Whonix does NOT make your PC's or router's IP address invisible. Your IP address is assigned to you by your ISP, and it is inalterable by third parties. You need the IP so that the Tor client may successfully connect to the Tor network on the Internet. When using Whonix, you are surfing through Tor servers on the Internet that all have their own separate IP address. The websites accessed by you will only see this respective outgoing address and not yours.
* Whonix does NOT accelerate Internet access. In fact by routing everything through the Tor network it becomes slower.
* Whonix is NOT The Tor Project. Tor is developed by The Tor Project.
* Whonix does not NOT use random "anonymous" proxies (e.g. those on lists of open proxies) to create an anonymous connection. This would be a totally unsafe method that does not lead to anonymization.
* Whonix is NO One-Click-Anonymization-Tool - something like that can and will not really ever exist! Prudence and knowledge remain maxim for Internet security.

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Dev/Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>f7p0wicy06626jtwxzt3w88wtrukknu</sha1>
    </revision>
    <revision>
      <id>1275</id>
      <parentid>1261</parentid>
      <timestamp>2013-07-13T23:34:23Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>/* Whonix is based on Debian... ; Continuing the theme of "tor + debian + virtual box", i'm making this section about debian.</comment>
      <origin>1275</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="7949" sha1="93foexhjtgcumts1mo3elxkyb6g3x3s" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A web browser, IRC client, word processer, and more come pre-configured with security in mind.

It is a complete operating system designed to be used inside a host operating system, such as your computer's currently installed OS or an OS installed independently on an external drive. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and Virtual Box&lt;ref&gt;https://en.wikipedia.org/wiki/VirtualBox&lt;/ref&gt;.

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through Tor or blocked.

Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Whonix is Debian =

To oversimplify it: Whonix is just a collection of configuration files.&lt;ref&gt;{{note}} Plus some shell extra shell scripts, a perl script (tails_htp) and a package selection. Whonix just puts everything together.&lt;/ref&gt;

This isn't a stripped down version of Debian. For example, anything &lt;ref&gt;{{note}} Actually only "almost" everything. Any limitations (beside bugs) will be Tor's responsibility. For example, UDP is not supported by Tor yet. Therefore, this won't work.&lt;/ref&gt; you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" "The same way you would with Debian ''apt-get install xrandr''". Whonix doesn't break anything and doesn't stop you from using any you want.

Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.

= Cryptography =

Whonix contains some State-of-the-art cryptographic tools, a selection of tools to protect your data using strong encryption:

* Automatically encrypt with HTTPS all your communications to a number of major websites using [https://www.eff.org/https-everywhere HTTPS Everywhere], a Firefox extension developed by the [https://www.eff.org Electronic Frontier Foundation].
* [https://en.wikipedia.org/wiki/GNU_Privacy_Guard GNU Privacy Guard]

= Summary of what Whonix is =

== What is Whonix? ==

* Whonix is an Anonymous Operating System, that spoofs your own IP/location.
* Tor multiply encrypts the data sent over the Tor network. Neither your access provider nor Tor operators (except for the exit node) can see your plaintext data.
* Tor does regularly change the outgoing IP address.
* Whonix is an Anti-Censorship-Application that allows access to otherwise blocked Internet sites. Advanced users may configure their Whonix as a forwarding server in order to allow others access to the Tor network.
* Whonix is open source and free.
* Tor Browser in Whonix filters and anonymizes HTTP headers.
* For anonymous e-mails please see [[E-Mail]], i.e. use Mozilla Thunderbird with TorBirdy, because it provides special, additional data filtering in the email client itself.
* Whonix is available on all major systems (Windows, Mac OS X, Linux).

== What is Whonix not? ==

* Whonix does NOT make your PC's or router's IP address invisible. Your IP address is assigned to you by your ISP, and it is inalterable by third parties. You need the IP so that the Tor client may successfully connect to the Tor network on the Internet. When using Whonix, you are surfing through Tor servers on the Internet that all have their own separate IP address. The websites accessed by you will only see this respective outgoing address and not yours.
* Whonix does NOT accelerate Internet access. In fact by routing everything through the Tor network it becomes slower.
* Whonix is NOT The Tor Project. Tor is developed by The Tor Project.
* Whonix does not NOT use random "anonymous" proxies (e.g. those on lists of open proxies) to create an anonymous connection. This would be a totally unsafe method that does not lead to anonymization.
* Whonix is NO One-Click-Anonymization-Tool - something like that can and will not really ever exist! Prudence and knowledge remain maxim for Internet security.

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Dev/Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>93foexhjtgcumts1mo3elxkyb6g3x3s</sha1>
    </revision>
    <revision>
      <id>1276</id>
      <parentid>1275</parentid>
      <timestamp>2013-07-14T03:48:42Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>added anchor so old links don't break</comment>
      <origin>1276</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="8024" sha1="6apdur911loxb3smzz0i2yg2d161uho" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A web browser, IRC client, word processer, and more come pre-configured with security in mind.

It is a complete operating system designed to be used inside a host operating system, such as your computer's currently installed OS or an OS installed independently on an external drive. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and Virtual Box&lt;ref&gt;https://en.wikipedia.org/wiki/VirtualBox&lt;/ref&gt;.

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through Tor or blocked.

Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Whonix is Debian =
&lt;span id="anchor_name"&gt;Whonix is based on Debian, VirtualBox and Tor&lt;/span&gt;
To oversimplify it: Whonix is just a collection of configuration files.&lt;ref&gt;{{note}} Plus some shell extra shell scripts, a perl script (tails_htp) and a package selection. Whonix just puts everything together.&lt;/ref&gt;

This isn't a stripped down version of Debian. For example, anything &lt;ref&gt;{{note}} Actually only "almost" everything. Any limitations (beside bugs) will be Tor's responsibility. For example, UDP is not supported by Tor yet. Therefore, this won't work.&lt;/ref&gt; you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" "The same way you would with Debian ''apt-get install xrandr''". Whonix doesn't break anything and doesn't stop you from using any you want.

Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.

= Cryptography =

Whonix contains some State-of-the-art cryptographic tools, a selection of tools to protect your data using strong encryption:

* Automatically encrypt with HTTPS all your communications to a number of major websites using [https://www.eff.org/https-everywhere HTTPS Everywhere], a Firefox extension developed by the [https://www.eff.org Electronic Frontier Foundation].
* [https://en.wikipedia.org/wiki/GNU_Privacy_Guard GNU Privacy Guard]

= Summary of what Whonix is =

== What is Whonix? ==

* Whonix is an Anonymous Operating System, that spoofs your own IP/location.
* Tor multiply encrypts the data sent over the Tor network. Neither your access provider nor Tor operators (except for the exit node) can see your plaintext data.
* Tor does regularly change the outgoing IP address.
* Whonix is an Anti-Censorship-Application that allows access to otherwise blocked Internet sites. Advanced users may configure their Whonix as a forwarding server in order to allow others access to the Tor network.
* Whonix is open source and free.
* Tor Browser in Whonix filters and anonymizes HTTP headers.
* For anonymous e-mails please see [[E-Mail]], i.e. use Mozilla Thunderbird with TorBirdy, because it provides special, additional data filtering in the email client itself.
* Whonix is available on all major systems (Windows, Mac OS X, Linux).

== What is Whonix not? ==

* Whonix does NOT make your PC's or router's IP address invisible. Your IP address is assigned to you by your ISP, and it is inalterable by third parties. You need the IP so that the Tor client may successfully connect to the Tor network on the Internet. When using Whonix, you are surfing through Tor servers on the Internet that all have their own separate IP address. The websites accessed by you will only see this respective outgoing address and not yours.
* Whonix does NOT accelerate Internet access. In fact by routing everything through the Tor network it becomes slower.
* Whonix is NOT The Tor Project. Tor is developed by The Tor Project.
* Whonix does not NOT use random "anonymous" proxies (e.g. those on lists of open proxies) to create an anonymous connection. This would be a totally unsafe method that does not lead to anonymization.
* Whonix is NO One-Click-Anonymization-Tool - something like that can and will not really ever exist! Prudence and knowledge remain maxim for Internet security.

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Dev/Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>6apdur911loxb3smzz0i2yg2d161uho</sha1>
    </revision>
    <revision>
      <id>1277</id>
      <parentid>1276</parentid>
      <timestamp>2013-07-14T03:56:11Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>try #3</comment>
      <origin>1277</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="8098" sha1="qrajts1faozsfc0o6hcwaxl6e0yai03" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A web browser, IRC client, word processer, and more come pre-configured with security in mind.

It is a complete operating system designed to be used inside a host operating system, such as your computer's currently installed OS or an OS installed independently on an external drive. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and Virtual Box&lt;ref&gt;https://en.wikipedia.org/wiki/VirtualBox&lt;/ref&gt;.

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through Tor or blocked.

Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Whonix is Debian =
&lt;span id="anchor_name"&gt;Whonix is based on Debian, VirtualBox and Tor&lt;/span&gt;
&lt;span id="About#Whonix_is_based_on_Debian.2C_VirtualBox_and_Tor"&gt;&lt;/span&gt;

To oversimplify it: Whonix is just a collection of configuration files.&lt;ref&gt;{{note}} Plus some shell extra shell scripts, a perl script (tails_htp) and a package selection. Whonix just puts everything together.&lt;/ref&gt;

This isn't a stripped down version of Debian. For example, anything &lt;ref&gt;{{note}} Actually only "almost" everything. Any limitations (beside bugs) will be Tor's responsibility. For example, UDP is not supported by Tor yet. Therefore, this won't work.&lt;/ref&gt; you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" "The same way you would with Debian ''apt-get install xrandr''". Whonix doesn't break anything and doesn't stop you from using any you want.

Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.

= Cryptography =

Whonix contains some State-of-the-art cryptographic tools, a selection of tools to protect your data using strong encryption:

* Automatically encrypt with HTTPS all your communications to a number of major websites using [https://www.eff.org/https-everywhere HTTPS Everywhere], a Firefox extension developed by the [https://www.eff.org Electronic Frontier Foundation].
* [https://en.wikipedia.org/wiki/GNU_Privacy_Guard GNU Privacy Guard]

= Summary of what Whonix is =

== What is Whonix? ==

* Whonix is an Anonymous Operating System, that spoofs your own IP/location.
* Tor multiply encrypts the data sent over the Tor network. Neither your access provider nor Tor operators (except for the exit node) can see your plaintext data.
* Tor does regularly change the outgoing IP address.
* Whonix is an Anti-Censorship-Application that allows access to otherwise blocked Internet sites. Advanced users may configure their Whonix as a forwarding server in order to allow others access to the Tor network.
* Whonix is open source and free.
* Tor Browser in Whonix filters and anonymizes HTTP headers.
* For anonymous e-mails please see [[E-Mail]], i.e. use Mozilla Thunderbird with TorBirdy, because it provides special, additional data filtering in the email client itself.
* Whonix is available on all major systems (Windows, Mac OS X, Linux).

== What is Whonix not? ==

* Whonix does NOT make your PC's or router's IP address invisible. Your IP address is assigned to you by your ISP, and it is inalterable by third parties. You need the IP so that the Tor client may successfully connect to the Tor network on the Internet. When using Whonix, you are surfing through Tor servers on the Internet that all have their own separate IP address. The websites accessed by you will only see this respective outgoing address and not yours.
* Whonix does NOT accelerate Internet access. In fact by routing everything through the Tor network it becomes slower.
* Whonix is NOT The Tor Project. Tor is developed by The Tor Project.
* Whonix does not NOT use random "anonymous" proxies (e.g. those on lists of open proxies) to create an anonymous connection. This would be a totally unsafe method that does not lead to anonymization.
* Whonix is NO One-Click-Anonymization-Tool - something like that can and will not really ever exist! Prudence and knowledge remain maxim for Internet security.

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Dev/Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>qrajts1faozsfc0o6hcwaxl6e0yai03</sha1>
    </revision>
    <revision>
      <id>1278</id>
      <parentid>1277</parentid>
      <timestamp>2013-07-14T03:58:38Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>We're not legally allowed to say "Whonix is Debian", phrases such as "based on Debian", "Debian Derivative", "Debian based" or "a derivative of Debian" however are ok. We may not claim to be Debian.</comment>
      <origin>1278</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="8107" sha1="rkbty8tivpzveiwl7qdacmo9r5opvz7" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A web browser, IRC client, word processer, and more come pre-configured with security in mind.

It is a complete operating system designed to be used inside a host operating system, such as your computer's currently installed OS or an OS installed independently on an external drive. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and Virtual Box&lt;ref&gt;https://en.wikipedia.org/wiki/VirtualBox&lt;/ref&gt;.

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through Tor or blocked.

Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Whonix is based on Debian =
&lt;span id="anchor_name"&gt;Whonix is based on Debian, VirtualBox and Tor&lt;/span&gt;
&lt;span id="About#Whonix_is_based_on_Debian.2C_VirtualBox_and_Tor"&gt;&lt;/span&gt;

To oversimplify it: Whonix is just a collection of configuration files.&lt;ref&gt;{{note}} Plus some shell extra shell scripts, a perl script (tails_htp) and a package selection. Whonix just puts everything together.&lt;/ref&gt;

This isn't a stripped down version of Debian. For example, anything &lt;ref&gt;{{note}} Actually only "almost" everything. Any limitations (beside bugs) will be Tor's responsibility. For example, UDP is not supported by Tor yet. Therefore, this won't work.&lt;/ref&gt; you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" "The same way you would with Debian ''apt-get install xrandr''". Whonix doesn't break anything and doesn't stop you from using any you want.

Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.

= Cryptography =

Whonix contains some State-of-the-art cryptographic tools, a selection of tools to protect your data using strong encryption:

* Automatically encrypt with HTTPS all your communications to a number of major websites using [https://www.eff.org/https-everywhere HTTPS Everywhere], a Firefox extension developed by the [https://www.eff.org Electronic Frontier Foundation].
* [https://en.wikipedia.org/wiki/GNU_Privacy_Guard GNU Privacy Guard]

= Summary of what Whonix is =

== What is Whonix? ==

* Whonix is an Anonymous Operating System, that spoofs your own IP/location.
* Tor multiply encrypts the data sent over the Tor network. Neither your access provider nor Tor operators (except for the exit node) can see your plaintext data.
* Tor does regularly change the outgoing IP address.
* Whonix is an Anti-Censorship-Application that allows access to otherwise blocked Internet sites. Advanced users may configure their Whonix as a forwarding server in order to allow others access to the Tor network.
* Whonix is open source and free.
* Tor Browser in Whonix filters and anonymizes HTTP headers.
* For anonymous e-mails please see [[E-Mail]], i.e. use Mozilla Thunderbird with TorBirdy, because it provides special, additional data filtering in the email client itself.
* Whonix is available on all major systems (Windows, Mac OS X, Linux).

== What is Whonix not? ==

* Whonix does NOT make your PC's or router's IP address invisible. Your IP address is assigned to you by your ISP, and it is inalterable by third parties. You need the IP so that the Tor client may successfully connect to the Tor network on the Internet. When using Whonix, you are surfing through Tor servers on the Internet that all have their own separate IP address. The websites accessed by you will only see this respective outgoing address and not yours.
* Whonix does NOT accelerate Internet access. In fact by routing everything through the Tor network it becomes slower.
* Whonix is NOT The Tor Project. Tor is developed by The Tor Project.
* Whonix does not NOT use random "anonymous" proxies (e.g. those on lists of open proxies) to create an anonymous connection. This would be a totally unsafe method that does not lead to anonymization.
* Whonix is NO One-Click-Anonymization-Tool - something like that can and will not really ever exist! Prudence and knowledge remain maxim for Internet security.

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Dev/Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>rkbty8tivpzveiwl7qdacmo9r5opvz7</sha1>
    </revision>
    <revision>
      <id>1284</id>
      <parentid>1278</parentid>
      <timestamp>2013-07-14T12:37:48Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>try #4</comment>
      <origin>1284</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="8017" sha1="hs46a9lmvbnno4xrj00ixirlx08i9hh" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A web browser, IRC client, word processer, and more come pre-configured with security in mind.

It is a complete operating system designed to be used inside a host operating system, such as your computer's currently installed OS or an OS installed independently on an external drive. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and Virtual Box&lt;ref&gt;https://en.wikipedia.org/wiki/VirtualBox&lt;/ref&gt;.

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through Tor or blocked.

Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Whonix is based on Debian =
{{anchor|Whonix_is_based_on_Debian.2C_VirtualBox_and_Tor}}

To oversimplify it: Whonix is just a collection of configuration files.&lt;ref&gt;{{note}} Plus some shell extra shell scripts, a perl script (tails_htp) and a package selection. Whonix just puts everything together.&lt;/ref&gt;

This isn't a stripped down version of Debian. For example, anything &lt;ref&gt;{{note}} Actually only "almost" everything. Any limitations (beside bugs) will be Tor's responsibility. For example, UDP is not supported by Tor yet. Therefore, this won't work.&lt;/ref&gt; you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" "The same way you would with Debian ''apt-get install xrandr''". Whonix doesn't break anything and doesn't stop you from using any you want.

Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.

= Cryptography =

Whonix contains some State-of-the-art cryptographic tools, a selection of tools to protect your data using strong encryption:

* Automatically encrypt with HTTPS all your communications to a number of major websites using [https://www.eff.org/https-everywhere HTTPS Everywhere], a Firefox extension developed by the [https://www.eff.org Electronic Frontier Foundation].
* [https://en.wikipedia.org/wiki/GNU_Privacy_Guard GNU Privacy Guard]

= Summary of what Whonix is =

== What is Whonix? ==

* Whonix is an Anonymous Operating System, that spoofs your own IP/location.
* Tor multiply encrypts the data sent over the Tor network. Neither your access provider nor Tor operators (except for the exit node) can see your plaintext data.
* Tor does regularly change the outgoing IP address.
* Whonix is an Anti-Censorship-Application that allows access to otherwise blocked Internet sites. Advanced users may configure their Whonix as a forwarding server in order to allow others access to the Tor network.
* Whonix is open source and free.
* Tor Browser in Whonix filters and anonymizes HTTP headers.
* For anonymous e-mails please see [[E-Mail]], i.e. use Mozilla Thunderbird with TorBirdy, because it provides special, additional data filtering in the email client itself.
* Whonix is available on all major systems (Windows, Mac OS X, Linux).

== What is Whonix not? ==

* Whonix does NOT make your PC's or router's IP address invisible. Your IP address is assigned to you by your ISP, and it is inalterable by third parties. You need the IP so that the Tor client may successfully connect to the Tor network on the Internet. When using Whonix, you are surfing through Tor servers on the Internet that all have their own separate IP address. The websites accessed by you will only see this respective outgoing address and not yours.
* Whonix does NOT accelerate Internet access. In fact by routing everything through the Tor network it becomes slower.
* Whonix is NOT The Tor Project. Tor is developed by The Tor Project.
* Whonix does not NOT use random "anonymous" proxies (e.g. those on lists of open proxies) to create an anonymous connection. This would be a totally unsafe method that does not lead to anonymization.
* Whonix is NO One-Click-Anonymization-Tool - something like that can and will not really ever exist! Prudence and knowledge remain maxim for Internet security.

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Dev/Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>hs46a9lmvbnno4xrj00ixirlx08i9hh</sha1>
    </revision>
    <revision>
      <id>1285</id>
      <parentid>1284</parentid>
      <timestamp>2013-07-14T12:38:58Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>anchor worked, just moved it above the title</comment>
      <origin>1285</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="8017" sha1="4hbwenpbxm37dclpi747jqadil5guw2" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A web browser, IRC client, word processer, and more come pre-configured with security in mind.

It is a complete operating system designed to be used inside a host operating system, such as your computer's currently installed OS or an OS installed independently on an external drive. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and Virtual Box&lt;ref&gt;https://en.wikipedia.org/wiki/VirtualBox&lt;/ref&gt;.

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through Tor or blocked.

Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

{{anchor|Whonix_is_based_on_Debian.2C_VirtualBox_and_Tor}}
= Whonix is based on Debian =

To oversimplify it: Whonix is just a collection of configuration files.&lt;ref&gt;{{note}} Plus some shell extra shell scripts, a perl script (tails_htp) and a package selection. Whonix just puts everything together.&lt;/ref&gt;

This isn't a stripped down version of Debian. For example, anything &lt;ref&gt;{{note}} Actually only "almost" everything. Any limitations (beside bugs) will be Tor's responsibility. For example, UDP is not supported by Tor yet. Therefore, this won't work.&lt;/ref&gt; you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" "The same way you would with Debian ''apt-get install xrandr''". Whonix doesn't break anything and doesn't stop you from using any you want.

Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.

= Cryptography =

Whonix contains some State-of-the-art cryptographic tools, a selection of tools to protect your data using strong encryption:

* Automatically encrypt with HTTPS all your communications to a number of major websites using [https://www.eff.org/https-everywhere HTTPS Everywhere], a Firefox extension developed by the [https://www.eff.org Electronic Frontier Foundation].
* [https://en.wikipedia.org/wiki/GNU_Privacy_Guard GNU Privacy Guard]

= Summary of what Whonix is =

== What is Whonix? ==

* Whonix is an Anonymous Operating System, that spoofs your own IP/location.
* Tor multiply encrypts the data sent over the Tor network. Neither your access provider nor Tor operators (except for the exit node) can see your plaintext data.
* Tor does regularly change the outgoing IP address.
* Whonix is an Anti-Censorship-Application that allows access to otherwise blocked Internet sites. Advanced users may configure their Whonix as a forwarding server in order to allow others access to the Tor network.
* Whonix is open source and free.
* Tor Browser in Whonix filters and anonymizes HTTP headers.
* For anonymous e-mails please see [[E-Mail]], i.e. use Mozilla Thunderbird with TorBirdy, because it provides special, additional data filtering in the email client itself.
* Whonix is available on all major systems (Windows, Mac OS X, Linux).

== What is Whonix not? ==

* Whonix does NOT make your PC's or router's IP address invisible. Your IP address is assigned to you by your ISP, and it is inalterable by third parties. You need the IP so that the Tor client may successfully connect to the Tor network on the Internet. When using Whonix, you are surfing through Tor servers on the Internet that all have their own separate IP address. The websites accessed by you will only see this respective outgoing address and not yours.
* Whonix does NOT accelerate Internet access. In fact by routing everything through the Tor network it becomes slower.
* Whonix is NOT The Tor Project. Tor is developed by The Tor Project.
* Whonix does not NOT use random "anonymous" proxies (e.g. those on lists of open proxies) to create an anonymous connection. This would be a totally unsafe method that does not lead to anonymization.
* Whonix is NO One-Click-Anonymization-Tool - something like that can and will not really ever exist! Prudence and knowledge remain maxim for Internet security.

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Dev/Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>4hbwenpbxm37dclpi747jqadil5guw2</sha1>
    </revision>
    <revision>
      <id>1309</id>
      <parentid>1285</parentid>
      <timestamp>2013-07-14T22:56:22Z</timestamp>
      <contributor>
        <username>JasonJAyalaP</username>
        <id>9</id>
      </contributor>
      <comment>Deleted "cryptography" section. This suggested that Whonix provides special cryptography tools. Https everywhere shouldn't be presented on the same level as Debian/Tor/Virtual box.</comment>
      <origin>1309</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="7558" sha1="h8oxrku1dj6yiwx3kdp6rimxuz9znrc" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A web browser, IRC client, word processer, and more come pre-configured with security in mind.

It is a complete operating system designed to be used inside a host operating system, such as your computer's currently installed OS or an OS installed independently on an external drive. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and Virtual Box&lt;ref&gt;https://en.wikipedia.org/wiki/VirtualBox&lt;/ref&gt;.

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through Tor or blocked.

Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

{{anchor|Whonix_is_based_on_Debian.2C_VirtualBox_and_Tor}}
= Whonix is based on Debian =

To oversimplify it: Whonix is just a collection of configuration files.&lt;ref&gt;{{note}} Plus some shell extra shell scripts, a perl script (tails_htp) and a package selection. Whonix just puts everything together.&lt;/ref&gt;

This isn't a stripped down version of Debian. For example, anything &lt;ref&gt;{{note}} Actually only "almost" everything. Any limitations (beside bugs) will be Tor's responsibility. For example, UDP is not supported by Tor yet. Therefore, this won't work.&lt;/ref&gt; you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" "The same way you would with Debian ''apt-get install xrandr''". Whonix doesn't break anything and doesn't stop you from using any you want.

Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.

= Summary of what Whonix is =

== What is Whonix? ==

* Whonix is an Anonymous Operating System, that spoofs your own IP/location.
* Tor multiply encrypts the data sent over the Tor network. Neither your access provider nor Tor operators (except for the exit node) can see your plaintext data.
* Tor does regularly change the outgoing IP address.
* Whonix is an Anti-Censorship-Application that allows access to otherwise blocked Internet sites. Advanced users may configure their Whonix as a forwarding server in order to allow others access to the Tor network.
* Whonix is open source and free.
* Tor Browser in Whonix filters and anonymizes HTTP headers.
* For anonymous e-mails please see [[E-Mail]], i.e. use Mozilla Thunderbird with TorBirdy, because it provides special, additional data filtering in the email client itself.
* Whonix is available on all major systems (Windows, Mac OS X, Linux).

== What is Whonix not? ==

* Whonix does NOT make your PC's or router's IP address invisible. Your IP address is assigned to you by your ISP, and it is inalterable by third parties. You need the IP so that the Tor client may successfully connect to the Tor network on the Internet. When using Whonix, you are surfing through Tor servers on the Internet that all have their own separate IP address. The websites accessed by you will only see this respective outgoing address and not yours.
* Whonix does NOT accelerate Internet access. In fact by routing everything through the Tor network it becomes slower.
* Whonix is NOT The Tor Project. Tor is developed by The Tor Project.
* Whonix does not NOT use random "anonymous" proxies (e.g. those on lists of open proxies) to create an anonymous connection. This would be a totally unsafe method that does not lead to anonymization.
* Whonix is NO One-Click-Anonymization-Tool - something like that can and will not really ever exist! Prudence and knowledge remain maxim for Internet security.

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Dev/Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>h8oxrku1dj6yiwx3kdp6rimxuz9znrc</sha1>
    </revision>
    <revision>
      <id>1324</id>
      <parentid>1309</parentid>
      <timestamp>2013-07-15T16:10:21Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replace - "Dev/Authorship" to "Authorship"</comment>
      <origin>1324</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="7554" sha1="fo21y9b2rnggoy3dla8mavxoiguvyf9" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A web browser, IRC client, word processer, and more come pre-configured with security in mind.

It is a complete operating system designed to be used inside a host operating system, such as your computer's currently installed OS or an OS installed independently on an external drive. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and Virtual Box&lt;ref&gt;https://en.wikipedia.org/wiki/VirtualBox&lt;/ref&gt;.

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through Tor or blocked.

Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

{{anchor|Whonix_is_based_on_Debian.2C_VirtualBox_and_Tor}}
= Whonix is based on Debian =

To oversimplify it: Whonix is just a collection of configuration files.&lt;ref&gt;{{note}} Plus some shell extra shell scripts, a perl script (tails_htp) and a package selection. Whonix just puts everything together.&lt;/ref&gt;

This isn't a stripped down version of Debian. For example, anything &lt;ref&gt;{{note}} Actually only "almost" everything. Any limitations (beside bugs) will be Tor's responsibility. For example, UDP is not supported by Tor yet. Therefore, this won't work.&lt;/ref&gt; you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" "The same way you would with Debian ''apt-get install xrandr''". Whonix doesn't break anything and doesn't stop you from using any you want.

Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.

= Summary of what Whonix is =

== What is Whonix? ==

* Whonix is an Anonymous Operating System, that spoofs your own IP/location.
* Tor multiply encrypts the data sent over the Tor network. Neither your access provider nor Tor operators (except for the exit node) can see your plaintext data.
* Tor does regularly change the outgoing IP address.
* Whonix is an Anti-Censorship-Application that allows access to otherwise blocked Internet sites. Advanced users may configure their Whonix as a forwarding server in order to allow others access to the Tor network.
* Whonix is open source and free.
* Tor Browser in Whonix filters and anonymizes HTTP headers.
* For anonymous e-mails please see [[E-Mail]], i.e. use Mozilla Thunderbird with TorBirdy, because it provides special, additional data filtering in the email client itself.
* Whonix is available on all major systems (Windows, Mac OS X, Linux).

== What is Whonix not? ==

* Whonix does NOT make your PC's or router's IP address invisible. Your IP address is assigned to you by your ISP, and it is inalterable by third parties. You need the IP so that the Tor client may successfully connect to the Tor network on the Internet. When using Whonix, you are surfing through Tor servers on the Internet that all have their own separate IP address. The websites accessed by you will only see this respective outgoing address and not yours.
* Whonix does NOT accelerate Internet access. In fact by routing everything through the Tor network it becomes slower.
* Whonix is NOT The Tor Project. Tor is developed by The Tor Project.
* Whonix does not NOT use random "anonymous" proxies (e.g. those on lists of open proxies) to create an anonymous connection. This would be a totally unsafe method that does not lead to anonymization.
* Whonix is NO One-Click-Anonymization-Tool - something like that can and will not really ever exist! Prudence and knowledge remain maxim for Internet security.

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>fo21y9b2rnggoy3dla8mavxoiguvyf9</sha1>
    </revision>
    <revision>
      <id>1419</id>
      <parentid>1324</parentid>
      <timestamp>2013-07-16T01:02:10Z</timestamp>
      <contributor>
        <username>JasonJAyalaP</username>
        <id>9</id>
      </contributor>
      <comment>/* Introduction */ Got rid of virtual box reference. Not very important here, and we don't want to put it on the same level as tor and Debian.</comment>
      <origin>1419</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="7489" sha1="d2neg4wrdq5ozh6c4ci007umz1xwaaw" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A web browser, IRC client, word processer, and more come pre-configured with security in mind.

It is a complete operating system designed to be used inside a host operating system, such as your computer's currently installed OS or an OS installed independently on an external drive. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt; and Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;.

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through Tor or blocked.

Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

{{anchor|Whonix_is_based_on_Debian.2C_VirtualBox_and_Tor}}
= Whonix is based on Debian =

To oversimplify it: Whonix is just a collection of configuration files.&lt;ref&gt;{{note}} Plus some shell extra shell scripts, a perl script (tails_htp) and a package selection. Whonix just puts everything together.&lt;/ref&gt;

This isn't a stripped down version of Debian. For example, anything &lt;ref&gt;{{note}} Actually only "almost" everything. Any limitations (beside bugs) will be Tor's responsibility. For example, UDP is not supported by Tor yet. Therefore, this won't work.&lt;/ref&gt; you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" "The same way you would with Debian ''apt-get install xrandr''". Whonix doesn't break anything and doesn't stop you from using any you want.

Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.

= Summary of what Whonix is =

== What is Whonix? ==

* Whonix is an Anonymous Operating System, that spoofs your own IP/location.
* Tor multiply encrypts the data sent over the Tor network. Neither your access provider nor Tor operators (except for the exit node) can see your plaintext data.
* Tor does regularly change the outgoing IP address.
* Whonix is an Anti-Censorship-Application that allows access to otherwise blocked Internet sites. Advanced users may configure their Whonix as a forwarding server in order to allow others access to the Tor network.
* Whonix is open source and free.
* Tor Browser in Whonix filters and anonymizes HTTP headers.
* For anonymous e-mails please see [[E-Mail]], i.e. use Mozilla Thunderbird with TorBirdy, because it provides special, additional data filtering in the email client itself.
* Whonix is available on all major systems (Windows, Mac OS X, Linux).

== What is Whonix not? ==

* Whonix does NOT make your PC's or router's IP address invisible. Your IP address is assigned to you by your ISP, and it is inalterable by third parties. You need the IP so that the Tor client may successfully connect to the Tor network on the Internet. When using Whonix, you are surfing through Tor servers on the Internet that all have their own separate IP address. The websites accessed by you will only see this respective outgoing address and not yours.
* Whonix does NOT accelerate Internet access. In fact by routing everything through the Tor network it becomes slower.
* Whonix is NOT The Tor Project. Tor is developed by The Tor Project.
* Whonix does not NOT use random "anonymous" proxies (e.g. those on lists of open proxies) to create an anonymous connection. This would be a totally unsafe method that does not lead to anonymization.
* Whonix is NO One-Click-Anonymization-Tool - something like that can and will not really ever exist! Prudence and knowledge remain maxim for Internet security.

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>d2neg4wrdq5ozh6c4ci007umz1xwaaw</sha1>
    </revision>
    <revision>
      <id>1420</id>
      <parentid>1419</parentid>
      <timestamp>2013-07-16T01:17:15Z</timestamp>
      <contributor>
        <username>JasonJAyalaP</username>
        <id>9</id>
      </contributor>
      <comment>/* Anonymity online through Tor */ Made tor description more concise and straightforward for the novice.</comment>
      <origin>1420</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="7151" sha1="1kcrpbvaw1uhdkzuxl49ir9mr9svd30" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A web browser, IRC client, word processer, and more come pre-configured with security in mind.

It is a complete operating system designed to be used inside a host operating system, such as your computer's currently installed OS or an OS installed independently on an external drive. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt; and Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;.

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Whonix is based on Debian =

To oversimplify it: Whonix is just a collection of configuration files.&lt;ref&gt;{{note}} Plus some shell extra shell scripts, a perl script (tails_htp) and a package selection. Whonix just puts everything together.&lt;/ref&gt;

This isn't a stripped down version of Debian. For example, anything &lt;ref&gt;{{note}} Actually only "almost" everything. Any limitations (beside bugs) will be Tor's responsibility. For example, UDP is not supported by Tor yet. Therefore, this won't work.&lt;/ref&gt; you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" "The same way you would with Debian ''apt-get install xrandr''". Whonix doesn't break anything and doesn't stop you from using any you want.

Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.

= Summary of what Whonix is =

== What is Whonix? ==

* Whonix is an Anonymous Operating System, that spoofs your own IP/location.
* Tor multiply encrypts the data sent over the Tor network. Neither your access provider nor Tor operators (except for the exit node) can see your plaintext data.
* Tor does regularly change the outgoing IP address.
* Whonix is an Anti-Censorship-Application that allows access to otherwise blocked Internet sites. Advanced users may configure their Whonix as a forwarding server in order to allow others access to the Tor network.
* Whonix is open source and free.
* Tor Browser in Whonix filters and anonymizes HTTP headers.
* For anonymous e-mails please see [[E-Mail]], i.e. use Mozilla Thunderbird with TorBirdy, because it provides special, additional data filtering in the email client itself.
* Whonix is available on all major systems (Windows, Mac OS X, Linux).

== What is Whonix not? ==

* Whonix does NOT make your PC's or router's IP address invisible. Your IP address is assigned to you by your ISP, and it is inalterable by third parties. You need the IP so that the Tor client may successfully connect to the Tor network on the Internet. When using Whonix, you are surfing through Tor servers on the Internet that all have their own separate IP address. The websites accessed by you will only see this respective outgoing address and not yours.
* Whonix does NOT accelerate Internet access. In fact by routing everything through the Tor network it becomes slower.
* Whonix is NOT The Tor Project. Tor is developed by The Tor Project.
* Whonix does not NOT use random "anonymous" proxies (e.g. those on lists of open proxies) to create an anonymous connection. This would be a totally unsafe method that does not lead to anonymization.
* Whonix is NO One-Click-Anonymization-Tool - something like that can and will not really ever exist! Prudence and knowledge remain maxim for Internet security.

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>1kcrpbvaw1uhdkzuxl49ir9mr9svd30</sha1>
    </revision>
    <revision>
      <id>1421</id>
      <parentid>1420</parentid>
      <timestamp>2013-07-16T01:44:29Z</timestamp>
      <contributor>
        <username>JasonJAyalaP</username>
        <id>9</id>
      </contributor>
      <comment>/* Summary of what Whonix is */ The summary should be the shortest and most concise section. I cut a lot, but I think it's better this way. The best way to prevent wild misunderstandings is by simple statements of what whonix is</comment>
      <origin>1421</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5611" sha1="0apqgvsjc520oj0143yzqvgtm6yc9iq" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A web browser, IRC client, word processer, and more come pre-configured with security in mind.

It is a complete operating system designed to be used inside a host operating system, such as your computer's currently installed OS or an OS installed independently on an external drive. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt; and Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;.

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Whonix is based on Debian =

To oversimplify it: Whonix is just a collection of configuration files.&lt;ref&gt;{{note}} Plus some shell extra shell scripts, a perl script (tails_htp) and a package selection. Whonix just puts everything together.&lt;/ref&gt;

This isn't a stripped down version of Debian. For example, anything &lt;ref&gt;{{note}} Actually only "almost" everything. Any limitations (beside bugs) will be Tor's responsibility. For example, UDP is not supported by Tor yet. Therefore, this won't work.&lt;/ref&gt; you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" "The same way you would with Debian ''apt-get install xrandr''". Whonix doesn't break anything and doesn't stop you from using any you want.

Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in keeping your identity safe online

== Whonix Helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is Not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>0apqgvsjc520oj0143yzqvgtm6yc9iq</sha1>
    </revision>
    <revision>
      <id>1422</id>
      <parentid>1421</parentid>
      <timestamp>2013-07-16T01:45:19Z</timestamp>
      <contributor>
        <username>JasonJAyalaP</username>
        <id>9</id>
      </contributor>
      <minor/>
      <comment>/* Summary */</comment>
      <origin>1422</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5611" sha1="b6iac5ojsbvin417gtjvzwb24bhh30l" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A web browser, IRC client, word processer, and more come pre-configured with security in mind.

It is a complete operating system designed to be used inside a host operating system, such as your computer's currently installed OS or an OS installed independently on an external drive. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt; and Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;.

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Whonix is based on Debian =

To oversimplify it: Whonix is just a collection of configuration files.&lt;ref&gt;{{note}} Plus some shell extra shell scripts, a perl script (tails_htp) and a package selection. Whonix just puts everything together.&lt;/ref&gt;

This isn't a stripped down version of Debian. For example, anything &lt;ref&gt;{{note}} Actually only "almost" everything. Any limitations (beside bugs) will be Tor's responsibility. For example, UDP is not supported by Tor yet. Therefore, this won't work.&lt;/ref&gt; you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" "The same way you would with Debian ''apt-get install xrandr''". Whonix doesn't break anything and doesn't stop you from using any you want.

Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in keeping your identity safe online

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>b6iac5ojsbvin417gtjvzwb24bhh30l</sha1>
    </revision>
    <revision>
      <id>1482</id>
      <parentid>1422</parentid>
      <timestamp>2013-07-17T19:57:53Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Whonix is based on Debian */</comment>
      <origin>1482</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5713" sha1="hhs70ao30q84w4rej8h1v5dh130d3qy" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A web browser, IRC client, word processer, and more come pre-configured with security in mind.

It is a complete operating system designed to be used inside a host operating system, such as your computer's currently installed OS or an OS installed independently on an external drive. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt; and Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;.

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Whonix is based on Debian =

To oversimplify it: Whonix is just a collection of configuration files.&lt;ref&gt;{{note}} Plus some shell extra shell scripts, a perl script (tails_htp) and a package selection. Whonix just puts everything together.&lt;/ref&gt;

This isn't a stripped down version of Debian. For example, anything &lt;ref&gt;{{note}} Actually only "almost" everything. Any limitations (beside bugs) will be Tor's responsibility. For example, UDP is not supported by Tor yet. Therefore, this won't work.&lt;/ref&gt; you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" "The same way you would with Debian ''apt-get install xrandr''". Whonix doesn't break anything and doesn't stop you from using any you want.

{{mbox
| type       = notice
| image      = [[File:Ambox_notice.png|40px|alt=Info]]
| text       = Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.
}}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in keeping your identity safe online

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>hhs70ao30q84w4rej8h1v5dh130d3qy</sha1>
    </revision>
    <revision>
      <id>1500</id>
      <parentid>1482</parentid>
      <timestamp>2013-07-18T02:21:45Z</timestamp>
      <contributor>
        <username>JasonJAyalaP</username>
        <id>9</id>
      </contributor>
      <comment>Added section on Security by Isolation</comment>
      <origin>1500</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5979" sha1="bbg5fkbl9mtp5w0o947cjiv3897cjfe" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A web browser, IRC client, word processer, and more come pre-configured with security in mind.

It is a complete operating system designed to be used inside a host operating system, such as your computer's currently installed OS or an OS installed independently on an external drive. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt; and Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;.

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Whonix is based on Debian =

To oversimplify it: Whonix is just a collection of configuration files.&lt;ref&gt;{{note}} Plus some shell extra shell scripts, a perl script (tails_htp) and a package selection. Whonix just puts everything together.&lt;/ref&gt;

This isn't a stripped down version of Debian. For example, anything &lt;ref&gt;{{note}} Actually only "almost" everything. Any limitations (beside bugs) will be Tor's responsibility. For example, UDP is not supported by Tor yet. Therefore, this won't work.&lt;/ref&gt; you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" "The same way you would with Debian ''apt-get install xrandr''". Whonix doesn't break anything and doesn't stop you from using any you want.

{{mbox
| type       = notice
| image      = [[File:Ambox_notice.png|40px|alt=Info]]
| text       = Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.
}}

= Security by Isolation =

Whonix is divided into two parts: One for your work and one for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error.

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in keeping your identity safe online

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>bbg5fkbl9mtp5w0o947cjiv3897cjfe</sha1>
    </revision>
    <revision>
      <id>1501</id>
      <parentid>1500</parentid>
      <timestamp>2013-07-18T02:22:22Z</timestamp>
      <contributor>
        <username>JasonJAyalaP</username>
        <id>9</id>
      </contributor>
      <comment>/* Whonix is based on Debian */  Extra "whonix" is extra.</comment>
      <origin>1501</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5969" sha1="0v294zpvp0mwj7vdmjuj5xlyt4jr6h6" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A web browser, IRC client, word processer, and more come pre-configured with security in mind.

It is a complete operating system designed to be used inside a host operating system, such as your computer's currently installed OS or an OS installed independently on an external drive. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt; and Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;.

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =

To oversimplify it: Whonix is just a collection of configuration files.&lt;ref&gt;{{note}} Plus some shell extra shell scripts, a perl script (tails_htp) and a package selection. Whonix just puts everything together.&lt;/ref&gt;

This isn't a stripped down version of Debian. For example, anything &lt;ref&gt;{{note}} Actually only "almost" everything. Any limitations (beside bugs) will be Tor's responsibility. For example, UDP is not supported by Tor yet. Therefore, this won't work.&lt;/ref&gt; you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" "The same way you would with Debian ''apt-get install xrandr''". Whonix doesn't break anything and doesn't stop you from using any you want.

{{mbox
| type       = notice
| image      = [[File:Ambox_notice.png|40px|alt=Info]]
| text       = Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.
}}

= Security by Isolation =

Whonix is divided into two parts: One for your work and one for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error.

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in keeping your identity safe online

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>0v294zpvp0mwj7vdmjuj5xlyt4jr6h6</sha1>
    </revision>
    <revision>
      <id>1502</id>
      <parentid>1501</parentid>
      <timestamp>2013-07-18T02:23:38Z</timestamp>
      <contributor>
        <username>JasonJAyalaP</username>
        <id>9</id>
      </contributor>
      <comment>/* Introduction */ added sec by iso</comment>
      <origin>1502</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5993" sha1="cybfj1948ncy0ivckbt8e9ur5d5fhtn" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A web browser, IRC client, word processer, and more come pre-configured with security in mind.

It is a complete operating system designed to be used inside a host operating system, such as your computer's currently installed OS or an OS installed independently on an external drive. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and security by isolation.

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =

To oversimplify it: Whonix is just a collection of configuration files.&lt;ref&gt;{{note}} Plus some shell extra shell scripts, a perl script (tails_htp) and a package selection. Whonix just puts everything together.&lt;/ref&gt;

This isn't a stripped down version of Debian. For example, anything &lt;ref&gt;{{note}} Actually only "almost" everything. Any limitations (beside bugs) will be Tor's responsibility. For example, UDP is not supported by Tor yet. Therefore, this won't work.&lt;/ref&gt; you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" "The same way you would with Debian ''apt-get install xrandr''". Whonix doesn't break anything and doesn't stop you from using any you want.

{{mbox
| type       = notice
| image      = [[File:Ambox_notice.png|40px|alt=Info]]
| text       = Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.
}}

= Security by Isolation =

Whonix is divided into two parts: One for your work and one for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error.

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in keeping your identity safe online

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>cybfj1948ncy0ivckbt8e9ur5d5fhtn</sha1>
    </revision>
    <revision>
      <id>1503</id>
      <parentid>1502</parentid>
      <timestamp>2013-07-18T02:25:42Z</timestamp>
      <contributor>
        <username>JasonJAyalaP</username>
        <id>9</id>
      </contributor>
      <comment>/* Based on Debian */ Removed footnote (Footnotes carry a cost. This footnote wasn't worth its weight).</comment>
      <origin>1503</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5860" sha1="51zu44w8bkerucwig161k1hcgwvc8rz" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A web browser, IRC client, word processer, and more come pre-configured with security in mind.

It is a complete operating system designed to be used inside a host operating system, such as your computer's currently installed OS or an OS installed independently on an external drive. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and security by isolation.

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =

To oversimplify it: Whonix is just a collection of configuration files and scripts.

This isn't a stripped down version of Debian. For example, anything &lt;ref&gt;{{note}} Actually only "almost" everything. Any limitations (beside bugs) will be Tor's responsibility. For example, UDP is not supported by Tor yet. Therefore, this won't work.&lt;/ref&gt; you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" "The same way you would with Debian ''apt-get install xrandr''". Whonix doesn't break anything and doesn't stop you from using any you want.

{{mbox
| type       = notice
| image      = [[File:Ambox_notice.png|40px|alt=Info]]
| text       = Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.
}}

= Security by Isolation =

Whonix is divided into two parts: One for your work and one for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error.

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in keeping your identity safe online

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>51zu44w8bkerucwig161k1hcgwvc8rz</sha1>
    </revision>
    <revision>
      <id>1504</id>
      <parentid>1503</parentid>
      <timestamp>2013-07-18T02:27:49Z</timestamp>
      <contributor>
        <username>JasonJAyalaP</username>
        <id>9</id>
      </contributor>
      <comment>/* Based on Debian */ Removed footnote. More confusing than helpful (at this point).</comment>
      <origin>1504</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5671" sha1="3qkn46vgsjwuur6629q48i9n4svbt3b" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A web browser, IRC client, word processer, and more come pre-configured with security in mind.

It is a complete operating system designed to be used inside a host operating system, such as your computer's currently installed OS or an OS installed independently on an external drive. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and security by isolation.

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =

To oversimplify it: Whonix is just a collection of configuration files and scripts.

This isn't a stripped down version of Debian. For example, anything you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" "The same way you would with Debian ''apt-get install xrandr''". Whonix doesn't break anything and doesn't stop you from using any you want.

{{mbox
| type       = notice
| image      = [[File:Ambox_notice.png|40px|alt=Info]]
| text       = Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.
}}

= Security by Isolation =

Whonix is divided into two parts: One for your work and one for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error.

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in keeping your identity safe online

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>3qkn46vgsjwuur6629q48i9n4svbt3b</sha1>
    </revision>
    <revision>
      <id>1505</id>
      <parentid>1504</parentid>
      <timestamp>2013-07-18T02:28:47Z</timestamp>
      <contributor>
        <username>JasonJAyalaP</username>
        <id>9</id>
      </contributor>
      <minor/>
      <comment>/* Based on Debian */</comment>
      <origin>1505</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5674" sha1="lc2kdumaqpljjtdeifxmeesmxno8y7j" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A web browser, IRC client, word processer, and more come pre-configured with security in mind.

It is a complete operating system designed to be used inside a host operating system, such as your computer's currently installed OS or an OS installed independently on an external drive. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and security by isolation.

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =

To oversimplify it: Whonix is just a collection of configuration files and scripts.

This isn't a stripped down version of Debian. For example, anything you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" -- "The same way you would with Debian ''apt-get install xrandr''". Whonix doesn't break anything and doesn't stop you from using any you want.

{{mbox
| type       = notice
| image      = [[File:Ambox_notice.png|40px|alt=Info]]
| text       = Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.
}}

= Security by Isolation =

Whonix is divided into two parts: One for your work and one for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error.

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in keeping your identity safe online

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>lc2kdumaqpljjtdeifxmeesmxno8y7j</sha1>
    </revision>
    <revision>
      <id>1659</id>
      <parentid>1505</parentid>
      <timestamp>2013-07-25T00:11:13Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <origin>1659</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5674" sha1="92y3e4ajffeko4iwzmmir2pdroz9j9x" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A web browser, IRC client, word processor, and more come pre-configured with security in mind.

It is a complete operating system designed to be used inside a host operating system, such as your computer's currently installed OS or an OS installed independently on an external drive. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and security by isolation.

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =

To oversimplify it: Whonix is just a collection of configuration files and scripts.

This isn't a stripped down version of Debian. For example, anything you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" -- "The same way you would with Debian ''apt-get install xrandr''". Whonix doesn't break anything and doesn't stop you from using any you want.

{{mbox
| type       = notice
| image      = [[File:Ambox_notice.png|40px|alt=Info]]
| text       = Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.
}}

= Security by Isolation =

Whonix is divided into two parts: One for your work and one for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error.

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in keeping your identity safe online

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>92y3e4ajffeko4iwzmmir2pdroz9j9x</sha1>
    </revision>
    <revision>
      <id>1794</id>
      <parentid>1659</parentid>
      <timestamp>2013-07-25T23:47:55Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>This page needs better explanation, graphics and a focus on Whonix's key features like Isolation.</comment>
      <origin>1794</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5680" sha1="to26sowqhwfqg44gk56ocq5g3yqn9io" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A web browser, IRC client, word processor, and more come pre-configured with security in mind.

It is a complete operating system designed to be used inside a host operating system, such as your computer's currently installed OS or an OS installed independently on an external drive. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: One for your work and one for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error. 

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =

To oversimplify it: Whonix is just a collection of configuration files and scripts.

This isn't a stripped down version of Debian. For example, anything you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" -- "The same way you would with Debian ''apt-get install xrandr''". Whonix doesn't break anything and doesn't stop you from using anything you want.

{{mbox
| type       = notice
| image      = [[File:Ambox_notice.png|40px|alt=Info]]
| text       = Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.
}}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in keeping your identity safe online

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>to26sowqhwfqg44gk56ocq5g3yqn9io</sha1>
    </revision>
    <revision>
      <id>1867</id>
      <parentid>1794</parentid>
      <timestamp>2013-07-28T02:04:02Z</timestamp>
      <contributor>
        <username>JasonJAyalaP</username>
        <id>9</id>
      </contributor>
      <comment>/* Whonix is */</comment>
      <origin>1867</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5667" sha1="fiuizjkxkbebr9xw6q5bc12yn1wz1sq" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A web browser, IRC client, word processor, and more come pre-configured with security in mind.

It is a complete operating system designed to be used inside a host operating system, such as your computer's currently installed OS or an OS installed independently on an external drive. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: One for your work and one for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error. 

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =

To oversimplify it: Whonix is just a collection of configuration files and scripts.

This isn't a stripped down version of Debian. For example, anything you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" -- "The same way you would with Debian ''apt-get install xrandr''". Whonix doesn't break anything and doesn't stop you from using anything you want.

{{mbox
| type       = notice
| image      = [[File:Ambox_notice.png|40px|alt=Info]]
| text       = Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.
}}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] or not Trust Whonix,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>fiuizjkxkbebr9xw6q5bc12yn1wz1sq</sha1>
    </revision>
    <revision>
      <id>2133</id>
      <parentid>1867</parentid>
      <timestamp>2013-08-09T07:00:24Z</timestamp>
      <contributor>
        <username>Anon</username>
        <id>10</id>
      </contributor>
      <comment>/* What's next? */</comment>
      <origin>2133</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5661" sha1="rfgcvt90ryn3o1gvce6rhqcx3564ggw" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A web browser, IRC client, word processor, and more come pre-configured with security in mind.

It is a complete operating system designed to be used inside a host operating system, such as your computer's currently installed OS or an OS installed independently on an external drive. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: One for your work and one for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error. 

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =

To oversimplify it: Whonix is just a collection of configuration files and scripts.

This isn't a stripped down version of Debian. For example, anything you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" -- "The same way you would with Debian ''apt-get install xrandr''". Whonix doesn't break anything and doesn't stop you from using anything you want.

{{mbox
| type       = notice
| image      = [[File:Ambox_notice.png|40px|alt=Info]]
| text       = Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.
}}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>rfgcvt90ryn3o1gvce6rhqcx3564ggw</sha1>
    </revision>
    <revision>
      <id>2253</id>
      <parentid>2133</parentid>
      <timestamp>2013-08-10T13:04:40Z</timestamp>
      <contributor>
        <username>Anon</username>
        <id>10</id>
      </contributor>
      <comment>/* Introduction */</comment>
      <origin>2253</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5778" sha1="ialr33x1vdmq86o70kpw26z7b2be22w" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A [[Tor Browser|web browser]], [[XChat|IRC client]], word processor, and more come pre-configured with security in mind.

It is a complete operating system &lt;ref&gt;Which consists of two virtual machines: Whonix-Gateway and Whonix-Workstation&lt;/ref&gt; designed to be used inside a host operating system &lt;ref&gt;Such as your currently installed OS on your computer or an OS installed on an external drive.&lt;/ref&gt; It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: One for your work and one for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error. 

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =

To oversimplify it: Whonix is just a collection of configuration files and scripts.

This isn't a stripped down version of Debian. For example, anything you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" -- "The same way you would with Debian ''apt-get install xrandr''". Whonix doesn't break anything and doesn't stop you from using anything you want.

{{mbox
| type       = notice
| image      = [[File:Ambox_notice.png|40px|alt=Info]]
| text       = Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.
}}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>ialr33x1vdmq86o70kpw26z7b2be22w</sha1>
    </revision>
    <revision>
      <id>2254</id>
      <parentid>2253</parentid>
      <timestamp>2013-08-10T13:09:02Z</timestamp>
      <contributor>
        <username>Anon</username>
        <id>10</id>
      </contributor>
      <origin>2254</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5816" sha1="hjj6j3o5x8jb22nph0ekfhdd2eswvlv" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A [[Tor Browser|web browser]], [[XChat|IRC client]], word processor, and more come pre-configured with security in mind.

It is a complete operating system&lt;ref&gt;Which consists of two virtual machines: Whonix-Gateway and Whonix-Workstation&lt;/ref&gt; designed to be used inside a host operating system&lt;ref&gt;Such as your currently installed OS on your computer or an OS installed on an external drive.&lt;/ref&gt;. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt; and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;u&gt;Whonix-Workstation&lt;/u&gt; for your work and &lt;u&gt;Whonix-Gateway&lt;/u&gt; for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error. 

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =

To oversimplify it: Whonix is just a collection of configuration files and scripts.

This isn't a stripped down version of Debian. For example, anything you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" -- "The same way you would with Debian ''apt-get install xrandr''". Whonix doesn't break anything and doesn't stop you from using anything you want.

{{mbox
| type       = notice
| image      = [[File:Ambox_notice.png|40px|alt=Info]]
| text       = Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.
}}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>hjj6j3o5x8jb22nph0ekfhdd2eswvlv</sha1>
    </revision>
    <revision>
      <id>2459</id>
      <parentid>2254</parentid>
      <timestamp>2013-08-27T16:43:46Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>/* Based on Debian */</comment>
      <origin>2459</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5821" sha1="21lixioey7votoquhbpze74irtqgkuh" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A [[Tor Browser|web browser]], [[XChat|IRC client]], word processor, and more come pre-configured with security in mind.

It is a complete operating system&lt;ref&gt;Which consists of two virtual machines: Whonix-Gateway and Whonix-Workstation&lt;/ref&gt; designed to be used inside a host operating system&lt;ref&gt;Such as your currently installed OS on your computer or an OS installed on an external drive.&lt;/ref&gt;. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt; and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;u&gt;Whonix-Workstation&lt;/u&gt; for your work and &lt;u&gt;Whonix-Gateway&lt;/u&gt; for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error. 

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =

To oversimplify it: Whonix is just a collection of configuration files and scripts.

This isn't a stripped down version of Debian. For example, anything you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" -- "The same way you would with Debian {{Code|apt-get install xrandr}}". Whonix doesn't break anything and doesn't stop you from using anything you want.

{{mbox
| type       = notice
| image      = [[File:Ambox_notice.png|40px|alt=Info]]
| text       = Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.
}}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &amp;lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &amp;lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>21lixioey7votoquhbpze74irtqgkuh</sha1>
    </revision>
    <revision>
      <id>2593</id>
      <parentid>2459</parentid>
      <timestamp>2013-09-04T03:40:24Z</timestamp>
      <contributor>
        <username>Anon</username>
        <id>10</id>
      </contributor>
      <minor/>
      <comment>Text replace - "&amp;lt;" to "&lt;"</comment>
      <origin>2593</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5815" sha1="je6mmk8v3v0ypwrw9bmntbtg88vtjqr" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A [[Tor Browser|web browser]], [[XChat|IRC client]], word processor, and more come pre-configured with security in mind.

It is a complete operating system&lt;ref&gt;Which consists of two virtual machines: Whonix-Gateway and Whonix-Workstation&lt;/ref&gt; designed to be used inside a host operating system&lt;ref&gt;Such as your currently installed OS on your computer or an OS installed on an external drive.&lt;/ref&gt;. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt; and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;u&gt;Whonix-Workstation&lt;/u&gt; for your work and &lt;u&gt;Whonix-Gateway&lt;/u&gt; for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error. 

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =

To oversimplify it: Whonix is just a collection of configuration files and scripts.

This isn't a stripped down version of Debian. For example, anything you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" -- "The same way you would with Debian {{Code|apt-get install xrandr}}". Whonix doesn't break anything and doesn't stop you from using anything you want.

{{mbox
| type       = notice
| image      = [[File:Ambox_notice.png|40px|alt=Info]]
| text       = Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.
}}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&amp;gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&amp;gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>je6mmk8v3v0ypwrw9bmntbtg88vtjqr</sha1>
    </revision>
    <revision>
      <id>2616</id>
      <parentid>2593</parentid>
      <timestamp>2013-09-04T03:43:50Z</timestamp>
      <contributor>
        <username>Anon</username>
        <id>10</id>
      </contributor>
      <minor/>
      <comment>Text replace - "&amp;gt;" to "&gt;"</comment>
      <origin>2616</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5809" sha1="9nprizmotdvwaep8gqza9i58gc6wbur" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A [[Tor Browser|web browser]], [[XChat|IRC client]], word processor, and more come pre-configured with security in mind.

It is a complete operating system&lt;ref&gt;Which consists of two virtual machines: Whonix-Gateway and Whonix-Workstation&lt;/ref&gt; designed to be used inside a host operating system&lt;ref&gt;Such as your currently installed OS on your computer or an OS installed on an external drive.&lt;/ref&gt;. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt; and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;u&gt;Whonix-Workstation&lt;/u&gt; for your work and &lt;u&gt;Whonix-Gateway&lt;/u&gt; for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error. 

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =

To oversimplify it: Whonix is just a collection of configuration files and scripts.

This isn't a stripped down version of Debian. For example, anything you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" -- "The same way you would with Debian {{Code|apt-get install xrandr}}". Whonix doesn't break anything and doesn't stop you from using anything you want.

{{mbox
| type       = notice
| image      = [[File:Ambox_notice.png|40px|alt=Info]]
| text       = Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.
}}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220&amp;sid=ac8a6ca16eb768b3322be30b20375c97#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>9nprizmotdvwaep8gqza9i58gc6wbur</sha1>
    </revision>
    <revision>
      <id>2655</id>
      <parentid>2616</parentid>
      <timestamp>2013-09-04T04:09:23Z</timestamp>
      <contributor>
        <username>Anon</username>
        <id>10</id>
      </contributor>
      <minor/>
      <comment>Text replace - "&amp;sid=ac8a6ca16eb768b3322be30b20375c97" to ""</comment>
      <origin>2655</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5772" sha1="qxqsfgnq2e1qbhcvyh0fbz601hf1c9m" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A [[Tor Browser|web browser]], [[XChat|IRC client]], word processor, and more come pre-configured with security in mind.

It is a complete operating system&lt;ref&gt;Which consists of two virtual machines: Whonix-Gateway and Whonix-Workstation&lt;/ref&gt; designed to be used inside a host operating system&lt;ref&gt;Such as your currently installed OS on your computer or an OS installed on an external drive.&lt;/ref&gt;. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt; and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;u&gt;Whonix-Workstation&lt;/u&gt; for your work and &lt;u&gt;Whonix-Gateway&lt;/u&gt; for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error. 

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =

To oversimplify it: Whonix is just a collection of configuration files and scripts.

This isn't a stripped down version of Debian. For example, anything you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" -- "The same way you would with Debian {{Code|apt-get install xrandr}}". Whonix doesn't break anything and doesn't stop you from using anything you want.

{{mbox
| type       = notice
| image      = [[File:Ambox_notice.png|40px|alt=Info]]
| text       = Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.
}}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>qxqsfgnq2e1qbhcvyh0fbz601hf1c9m</sha1>
    </revision>
    <revision>
      <id>2682</id>
      <parentid>2655</parentid>
      <timestamp>2013-09-05T04:56:43Z</timestamp>
      <contributor>
        <username>Anon</username>
        <id>10</id>
      </contributor>
      <minor/>
      <comment>Text replace - "in Whonix wiki on &lt;https://sourceforge.net/p/whonix/wiki/GPLv3/&gt;" to "on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;"</comment>
      <origin>2682</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5770" sha1="2n24ebkwag0bq1yl421svihdt3rabnf" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A [[Tor Browser|web browser]], [[XChat|IRC client]], word processor, and more come pre-configured with security in mind.

It is a complete operating system&lt;ref&gt;Which consists of two virtual machines: Whonix-Gateway and Whonix-Workstation&lt;/ref&gt; designed to be used inside a host operating system&lt;ref&gt;Such as your currently installed OS on your computer or an OS installed on an external drive.&lt;/ref&gt;. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt; and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;u&gt;Whonix-Workstation&lt;/u&gt; for your work and &lt;u&gt;Whonix-Gateway&lt;/u&gt; for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error. 

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =

To oversimplify it: Whonix is just a collection of configuration files and scripts.

This isn't a stripped down version of Debian. For example, anything you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" -- "The same way you would with Debian {{Code|apt-get install xrandr}}". Whonix doesn't break anything and doesn't stop you from using anything you want.

{{mbox
| type       = notice
| image      = [[File:Ambox_notice.png|40px|alt=Info]]
| text       = Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.
}}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
Whonix About wiki page Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>2n24ebkwag0bq1yl421svihdt3rabnf</sha1>
    </revision>
    <revision>
      <id>4740</id>
      <parentid>2682</parentid>
      <timestamp>2014-01-14T17:38:39Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replace - "Portions Copyright (C) 2012 adrelanos &lt;adrelanos at riseup dot net&gt;" to "Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;"</comment>
      <origin>4740</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5766" sha1="cm3wavorr6j51wg77knmokghh3u27x7" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A [[Tor Browser|web browser]], [[XChat|IRC client]], word processor, and more come pre-configured with security in mind.

It is a complete operating system&lt;ref&gt;Which consists of two virtual machines: Whonix-Gateway and Whonix-Workstation&lt;/ref&gt; designed to be used inside a host operating system&lt;ref&gt;Such as your currently installed OS on your computer or an OS installed on an external drive.&lt;/ref&gt;. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt; and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;u&gt;Whonix-Workstation&lt;/u&gt; for your work and &lt;u&gt;Whonix-Gateway&lt;/u&gt; for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error. 

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =

To oversimplify it: Whonix is just a collection of configuration files and scripts.

This isn't a stripped down version of Debian. For example, anything you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" -- "The same way you would with Debian {{Code|apt-get install xrandr}}". Whonix doesn't break anything and doesn't stop you from using anything you want.

{{mbox
| type       = notice
| image      = [[File:Ambox_notice.png|40px|alt=Info]]
| text       = Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.
}}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>cm3wavorr6j51wg77knmokghh3u27x7</sha1>
    </revision>
    <revision>
      <id>5551</id>
      <parentid>4740</parentid>
      <timestamp>2014-02-22T02:13:34Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>5551</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5888" sha1="98r12gem75wdsrrjlnn3io93bbf08dt" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
}}
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A [[Tor Browser|web browser]], [[XChat|IRC client]], word processor, and more come pre-configured with security in mind.

It is a complete operating system&lt;ref&gt;Which consists of two virtual machines: Whonix-Gateway and Whonix-Workstation&lt;/ref&gt; designed to be used inside a host operating system&lt;ref&gt;Such as your currently installed OS on your computer or an OS installed on an external drive.&lt;/ref&gt;. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt; and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;u&gt;Whonix-Workstation&lt;/u&gt; for your work and &lt;u&gt;Whonix-Gateway&lt;/u&gt; for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error. 

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =

To oversimplify it: Whonix is just a collection of configuration files and scripts.

This isn't a stripped down version of Debian. For example, anything you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" -- "The same way you would with Debian {{Code|apt-get install xrandr}}". Whonix doesn't break anything and doesn't stop you from using anything you want.

{{mbox
| type       = notice
| image      = [[File:Ambox_notice.png|40px|alt=Info]]
| text       = Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.
}}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>98r12gem75wdsrrjlnn3io93bbf08dt</sha1>
    </revision>
    <revision>
      <id>7892</id>
      <parentid>5551</parentid>
      <timestamp>2014-05-18T06:58:37Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <origin>7892</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5901" sha1="b8jjx3adiw7mtcdj7cn709t4sl7d6o6" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
}}
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A [[Tor Browser|web browser]], [[XChat|IRC client]], word processor, and [[Software|more]] come pre-configured with security in mind.

It is a complete operating system&lt;ref&gt;Which consists of two virtual machines: Whonix-Gateway and Whonix-Workstation&lt;/ref&gt; designed to be used inside a host operating system&lt;ref&gt;Such as your currently installed OS on your computer or an OS installed on an external drive.&lt;/ref&gt;. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt; and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;u&gt;Whonix-Workstation&lt;/u&gt; for your work and &lt;u&gt;Whonix-Gateway&lt;/u&gt; for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error. 

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =

To oversimplify it: Whonix is just a collection of configuration files and scripts.

This isn't a stripped down version of Debian. For example, anything you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" -- "The same way you would with Debian {{Code|apt-get install xrandr}}". Whonix doesn't break anything and doesn't stop you from using anything you want.

{{mbox
| type       = notice
| image      = [[File:Ambox_notice.png|40px|alt=Info]]
| text       = Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.
}}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>b8jjx3adiw7mtcdj7cn709t4sl7d6o6</sha1>
    </revision>
    <revision>
      <id>16702</id>
      <parentid>7892</parentid>
      <timestamp>2015-08-08T06:49:18Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>add table of debian versions that whonix versions are based on</comment>
      <origin>16702</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="6185" sha1="300cpj3rlimmlspxg3zebrgkp3hm0r5" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
}}
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A [[Tor Browser|web browser]], [[XChat|IRC client]], word processor, and [[Software|more]] come pre-configured with security in mind.

It is a complete operating system&lt;ref&gt;Which consists of two virtual machines: Whonix-Gateway and Whonix-Workstation&lt;/ref&gt; designed to be used inside a host operating system&lt;ref&gt;Such as your currently installed OS on your computer or an OS installed on an external drive.&lt;/ref&gt;. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt; and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;u&gt;Whonix-Workstation&lt;/u&gt; for your work and &lt;u&gt;Whonix-Gateway&lt;/u&gt; for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error. 

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =

To oversimplify it: Whonix is just a collection of configuration files and scripts.

This isn't a stripped down version of Debian. For example, anything you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" -- "The same way you would with Debian {{Code|apt-get install xrandr}}". Whonix doesn't break anything and doesn't stop you from using anything you want.

Each version of Whonix is based on a particular version of Debian:

{| class="wikitable"
|-
! Whonix version !! Debian version
|-
| Whonix 10 || [https://www.debian.org/releases/wheezy/ Wheezy]
|-
| Whonix 11 (not released yet) || [https://www.debian.org/releases/jessie/ Jessie]
|}

{{mbox
| type       = notice
| image      = [[File:Ambox_notice.png|40px|alt=Info]]
| text       = Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.
}}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>300cpj3rlimmlspxg3zebrgkp3hm0r5</sha1>
    </revision>
    <revision>
      <id>16931</id>
      <parentid>16702</parentid>
      <timestamp>2015-08-22T19:28:21Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Based on Debian */</comment>
      <origin>16931</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="6193" sha1="1lfmnjld17j44wzkh6iojt886bu32pk" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
}}
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A [[Tor Browser|web browser]], [[XChat|IRC client]], word processor, and [[Software|more]] come pre-configured with security in mind.

It is a complete operating system&lt;ref&gt;Which consists of two virtual machines: Whonix-Gateway and Whonix-Workstation&lt;/ref&gt; designed to be used inside a host operating system&lt;ref&gt;Such as your currently installed OS on your computer or an OS installed on an external drive.&lt;/ref&gt;. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt; and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;u&gt;Whonix-Workstation&lt;/u&gt; for your work and &lt;u&gt;Whonix-Gateway&lt;/u&gt; for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error. 

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =

To oversimplify it: Whonix is just a collection of configuration files and scripts.

This isn't a stripped down version of Debian. For example, anything you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" -- "The same way you would with Debian {{Code|apt-get install xrandr}}". Whonix doesn't break anything and doesn't stop you from using anything you want.

Each version of Whonix is based on a particular version of Debian:

{| class="wikitable"
|-
! Whonix version !! Debian version
|-
| &lt;s&gt;Whonix 10 (deprecated)&lt;/s&gt; || &lt;s&gt;[https://www.debian.org/releases/wheezy/ wheezy]&lt;/s&gt;
|-
| Whonix 11 || [https://www.debian.org/releases/jessie/ jessie]
|}

{{mbox
| type       = notice
| image      = [[File:Ambox_notice.png|40px|alt=Info]]
| text       = Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.
}}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>1lfmnjld17j44wzkh6iojt886bu32pk</sha1>
    </revision>
    <revision>
      <id>16932</id>
      <parentid>16931</parentid>
      <timestamp>2015-08-22T19:30:38Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Based on Debian */</comment>
      <origin>16932</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="6258" sha1="41jfz0zc29wbunr9myi3da2bbqyo7k8" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
}}
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A [[Tor Browser|web browser]], [[XChat|IRC client]], word processor, and [[Software|more]] come pre-configured with security in mind.

It is a complete operating system&lt;ref&gt;Which consists of two virtual machines: Whonix-Gateway and Whonix-Workstation&lt;/ref&gt; designed to be used inside a host operating system&lt;ref&gt;Such as your currently installed OS on your computer or an OS installed on an external drive.&lt;/ref&gt;. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt; and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;u&gt;Whonix-Workstation&lt;/u&gt; for your work and &lt;u&gt;Whonix-Gateway&lt;/u&gt; for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error. 

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =

To oversimplify it: Whonix is just a collection of configuration files and scripts.

This isn't a stripped down version of Debian. For example, anything you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" -- "The same way you would with Debian {{Code|apt-get install xrandr}}". Whonix doesn't break anything and doesn't stop you from using anything you want.

Each version of Whonix is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian version'' !! Debian codename
|-
| &lt;s&gt;Whonix &lt;u&gt;10&lt;/u&gt; (deprecated)&lt;/s&gt; || ''&lt;s&gt;7&lt;/s&gt;'' || &lt;s&gt;[https://www.debian.org/releases/wheezy/ wheezy]&lt;/s&gt;
|-
| Whonix &lt;u&gt;11&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

{{mbox
| type      = notice
| image   = [[File:Ambox_notice.png|40px|alt=Info]]
| text       = Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.
}}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
Thanks to [https://anonymous-proxy-servers.net/ JonDos] ([https://anonymous-proxy-servers.net/forum/viewtopic.php?p=31220#p31220 Permission]). The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>41jfz0zc29wbunr9myi3da2bbqyo7k8</sha1>
    </revision>
    <revision>
      <id>17878</id>
      <parentid>16932</parentid>
      <timestamp>2015-09-26T00:04:32Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* License */</comment>
      <origin>17878</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="6126" sha1="1blgxhu8t8quktdvhyf148dzbky7wzw" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
}}
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A [[Tor Browser|web browser]], [[XChat|IRC client]], word processor, and [[Software|more]] come pre-configured with security in mind.

It is a complete operating system&lt;ref&gt;Which consists of two virtual machines: Whonix-Gateway and Whonix-Workstation&lt;/ref&gt; designed to be used inside a host operating system&lt;ref&gt;Such as your currently installed OS on your computer or an OS installed on an external drive.&lt;/ref&gt;. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt; and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;u&gt;Whonix-Workstation&lt;/u&gt; for your work and &lt;u&gt;Whonix-Gateway&lt;/u&gt; for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error. 

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =

To oversimplify it: Whonix is just a collection of configuration files and scripts.

This isn't a stripped down version of Debian. For example, anything you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" -- "The same way you would with Debian {{Code|apt-get install xrandr}}". Whonix doesn't break anything and doesn't stop you from using anything you want.

Each version of Whonix is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian version'' !! Debian codename
|-
| &lt;s&gt;Whonix &lt;u&gt;10&lt;/u&gt; (deprecated)&lt;/s&gt; || ''&lt;s&gt;7&lt;/s&gt;'' || &lt;s&gt;[https://www.debian.org/releases/wheezy/ wheezy]&lt;/s&gt;
|-
| Whonix &lt;u&gt;11&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

{{mbox
| type      = notice
| image   = [[File:Ambox_notice.png|40px|alt=Info]]
| text       = Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.
}}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>1blgxhu8t8quktdvhyf148dzbky7wzw</sha1>
    </revision>
    <revision>
      <id>18180</id>
      <parentid>17878</parentid>
      <timestamp>2015-10-05T07:44:21Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Based on Debian */</comment>
      <origin>18180</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="6126" sha1="on5k522mm7xn78ji9wlf3u7xrsus5nh" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
}}
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A [[Tor Browser|web browser]], [[XChat|IRC client]], word processor, and [[Software|more]] come pre-configured with security in mind.

It is a complete operating system&lt;ref&gt;Which consists of two virtual machines: Whonix-Gateway and Whonix-Workstation&lt;/ref&gt; designed to be used inside a host operating system&lt;ref&gt;Such as your currently installed OS on your computer or an OS installed on an external drive.&lt;/ref&gt;. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt; and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;u&gt;Whonix-Workstation&lt;/u&gt; for your work and &lt;u&gt;Whonix-Gateway&lt;/u&gt; for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error. 

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =

To oversimplify it: Whonix is just a collection of configuration files and scripts.

This isn't a stripped down version of Debian. For example, anything you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" -- "The same way you would with Debian {{Code|apt-get install xrandr}}". Whonix doesn't break anything and doesn't stop you from using anything you want.

{{mbox
| type      = notice
| image   = [[File:Ambox_notice.png|40px|alt=Info]]
| text       = Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.
}}

Each version of Whonix is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian version'' !! Debian codename
|-
| &lt;s&gt;Whonix &lt;u&gt;10&lt;/u&gt; (deprecated)&lt;/s&gt; || ''&lt;s&gt;7&lt;/s&gt;'' || &lt;s&gt;[https://www.debian.org/releases/wheezy/ wheezy]&lt;/s&gt;
|-
| Whonix &lt;u&gt;11&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Acknowledgements, Credits, Related projects, Authorship =

See [[Authorship]].

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>on5k522mm7xn78ji9wlf3u7xrsus5nh</sha1>
    </revision>
    <revision>
      <id>18794</id>
      <parentid>18180</parentid>
      <timestamp>2015-10-19T12:55:52Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Acknowledgements, Credits, Related projects, Authorship */</comment>
      <origin>18794</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="6044" sha1="fekxjjjxzi8glwfeztlopziklxfg516" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
}}
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A [[Tor Browser|web browser]], [[XChat|IRC client]], word processor, and [[Software|more]] come pre-configured with security in mind.

It is a complete operating system&lt;ref&gt;Which consists of two virtual machines: Whonix-Gateway and Whonix-Workstation&lt;/ref&gt; designed to be used inside a host operating system&lt;ref&gt;Such as your currently installed OS on your computer or an OS installed on an external drive.&lt;/ref&gt;. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt; and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;u&gt;Whonix-Workstation&lt;/u&gt; for your work and &lt;u&gt;Whonix-Gateway&lt;/u&gt; for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error. 

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =

To oversimplify it: Whonix is just a collection of configuration files and scripts.

This isn't a stripped down version of Debian. For example, anything you can do with "vanilla" Debian GNU/Linux, you can do with Whonix. Likewise, most problems and questions can be solved in the same way. For example: "How do I install xrandr on Whonix?" -- "The same way you would with Debian {{Code|apt-get install xrandr}}". Whonix doesn't break anything and doesn't stop you from using anything you want.

{{mbox
| type      = notice
| image   = [[File:Ambox_notice.png|40px|alt=Info]]
| text       = Tip: Since Ubuntu is also based on Debian, most online help for Ubuntu also works for Whonix.
}}

Each version of Whonix is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian version'' !! Debian codename
|-
| &lt;s&gt;Whonix &lt;u&gt;10&lt;/u&gt; (deprecated)&lt;/s&gt; || ''&lt;s&gt;7&lt;/s&gt;'' || &lt;s&gt;[https://www.debian.org/releases/wheezy/ wheezy]&lt;/s&gt;
|-
| Whonix &lt;u&gt;11&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>fekxjjjxzi8glwfeztlopziklxfg516</sha1>
    </revision>
    <revision>
      <id>19127</id>
      <parentid>18794</parentid>
      <timestamp>2015-11-14T21:59:02Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Based on Debian */</comment>
      <origin>19127</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5376" sha1="mcdgzmrfv7660aej2arn3vmedli750x" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
}}
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A [[Tor Browser|web browser]], [[XChat|IRC client]], word processor, and [[Software|more]] come pre-configured with security in mind.

It is a complete operating system&lt;ref&gt;Which consists of two virtual machines: Whonix-Gateway and Whonix-Workstation&lt;/ref&gt; designed to be used inside a host operating system&lt;ref&gt;Such as your currently installed OS on your computer or an OS installed on an external drive.&lt;/ref&gt;. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt; and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;u&gt;Whonix-Workstation&lt;/u&gt; for your work and &lt;u&gt;Whonix-Gateway&lt;/u&gt; for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error. 

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

Each version of Whonix is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian version'' !! Debian codename
|-
| &lt;s&gt;Whonix &lt;u&gt;10&lt;/u&gt; (deprecated)&lt;/s&gt; || ''&lt;s&gt;7&lt;/s&gt;'' || &lt;s&gt;[https://www.debian.org/releases/wheezy/ wheezy]&lt;/s&gt;
|-
| Whonix &lt;u&gt;11&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>mcdgzmrfv7660aej2arn3vmedli750x</sha1>
    </revision>
    <revision>
      <id>21447</id>
      <parentid>19127</parentid>
      <timestamp>2016-01-11T01:20:13Z</timestamp>
      <contributor>
        <username>Nurmagoz</username>
        <id>4391</id>
      </contributor>
      <origin>21447</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5450" sha1="h7lf8xqpriuhuo1mbt27ismt87lc467" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|og:image=https://www.whonix.org/w/images/c/c5/Information-275708_640.png
}}
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A [[Tor Browser|web browser]], [[XChat|IRC client]], word processor, and [[Software|more]] come pre-configured with security in mind.

It is a complete operating system&lt;ref&gt;Which consists of two virtual machines: Whonix-Gateway and Whonix-Workstation&lt;/ref&gt; designed to be used inside a host operating system&lt;ref&gt;Such as your currently installed OS on your computer or an OS installed on an external drive.&lt;/ref&gt;. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt; and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;u&gt;Whonix-Workstation&lt;/u&gt; for your work and &lt;u&gt;Whonix-Gateway&lt;/u&gt; for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error. 

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

Each version of Whonix is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian version'' !! Debian codename
|-
| &lt;s&gt;Whonix &lt;u&gt;10&lt;/u&gt; (deprecated)&lt;/s&gt; || ''&lt;s&gt;7&lt;/s&gt;'' || &lt;s&gt;[https://www.debian.org/releases/wheezy/ wheezy]&lt;/s&gt;
|-
| Whonix &lt;u&gt;11&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>h7lf8xqpriuhuo1mbt27ismt87lc467</sha1>
    </revision>
    <revision>
      <id>21683</id>
      <parentid>21447</parentid>
      <timestamp>2016-01-14T01:18:18Z</timestamp>
      <contributor>
        <username>Nurmagoz</username>
        <id>4391</id>
      </contributor>
      <origin>21683</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5453" sha1="8cdyuf3vgiaf2vjz43q0dzioga5idfc" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|og:image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A [[Tor Browser|web browser]], [[XChat|IRC client]], word processor, and [[Software|more]] come pre-configured with security in mind.

It is a complete operating system&lt;ref&gt;Which consists of two virtual machines: Whonix-Gateway and Whonix-Workstation&lt;/ref&gt; designed to be used inside a host operating system&lt;ref&gt;Such as your currently installed OS on your computer or an OS installed on an external drive.&lt;/ref&gt;. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt; and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;u&gt;Whonix-Workstation&lt;/u&gt; for your work and &lt;u&gt;Whonix-Gateway&lt;/u&gt; for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error. 

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

Each version of Whonix is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian version'' !! Debian codename
|-
| &lt;s&gt;Whonix &lt;u&gt;10&lt;/u&gt; (deprecated)&lt;/s&gt; || ''&lt;s&gt;7&lt;/s&gt;'' || &lt;s&gt;[https://www.debian.org/releases/wheezy/ wheezy]&lt;/s&gt;
|-
| Whonix &lt;u&gt;11,12&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>8cdyuf3vgiaf2vjz43q0dzioga5idfc</sha1>
    </revision>
    <revision>
      <id>23229</id>
      <parentid>21683</parentid>
      <timestamp>2016-04-21T00:49:56Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Security by Isolation */</comment>
      <origin>23229</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5489" sha1="59qdgwpz4ilbonl9o9ivk0b7gb26dz6" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|og:image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A [[Tor Browser|web browser]], [[XChat|IRC client]], word processor, and [[Software|more]] come pre-configured with security in mind.

It is a complete operating system&lt;ref&gt;Which consists of two virtual machines: Whonix-Gateway and Whonix-Workstation&lt;/ref&gt; designed to be used inside a host operating system&lt;ref&gt;Such as your currently installed OS on your computer or an OS installed on an external drive.&lt;/ref&gt;. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt; and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;u&gt;Whonix-Workstation&lt;/u&gt; for your work and &lt;u&gt;Whonix-Gateway&lt;/u&gt; for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

Each version of Whonix is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian version'' !! Debian codename
|-
| &lt;s&gt;Whonix &lt;u&gt;10&lt;/u&gt; (deprecated)&lt;/s&gt; || ''&lt;s&gt;7&lt;/s&gt;'' || &lt;s&gt;[https://www.debian.org/releases/wheezy/ wheezy]&lt;/s&gt;
|-
| Whonix &lt;u&gt;11,12&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>59qdgwpz4ilbonl9o9ivk0b7gb26dz6</sha1>
    </revision>
    <revision>
      <id>23231</id>
      <parentid>23229</parentid>
      <timestamp>2016-04-21T00:54:44Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Based on Debian */</comment>
      <origin>23231</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5369" sha1="1rk6cf1zk5fewy0h6rd581ezw8oizwg" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|og:image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A [[Tor Browser|web browser]], [[XChat|IRC client]], word processor, and [[Software|more]] come pre-configured with security in mind.

It is a complete operating system&lt;ref&gt;Which consists of two virtual machines: Whonix-Gateway and Whonix-Workstation&lt;/ref&gt; designed to be used inside a host operating system&lt;ref&gt;Such as your currently installed OS on your computer or an OS installed on an external drive.&lt;/ref&gt;. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt; and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;u&gt;Whonix-Workstation&lt;/u&gt; for your work and &lt;u&gt;Whonix-Gateway&lt;/u&gt; for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

Each version of Whonix is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian version'' !! Debian codename
|-
| Whonix &lt;u&gt;12&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>1rk6cf1zk5fewy0h6rd581ezw8oizwg</sha1>
    </revision>
    <revision>
      <id>23686</id>
      <parentid>23231</parentid>
      <timestamp>2016-05-18T11:56:04Z</timestamp>
      <contributor>
        <username>Arousal</username>
        <id>4444</id>
      </contributor>
      <origin>23686</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5361" sha1="h1s99es2gf5qf4kuk2yl7h3s7ofjyfp" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   这是个自由软件; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|og:image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A [[Tor Browser|web browser]], [[XChat|IRC client]], word processor, and [[Software|more]] come pre-configured with security in mind.

It is a complete operating system&lt;ref&gt;Which consists of two virtual machines: Whonix-Gateway and Whonix-Workstation&lt;/ref&gt; designed to be used inside a host operating system&lt;ref&gt;Such as your currently installed OS on your computer or an OS installed on an external drive.&lt;/ref&gt;. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt; and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;u&gt;Whonix-Workstation&lt;/u&gt; for your work and &lt;u&gt;Whonix-Gateway&lt;/u&gt; for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

Each version of Whonix is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian version'' !! Debian codename
|-
| Whonix &lt;u&gt;12&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>h1s99es2gf5qf4kuk2yl7h3s7ofjyfp</sha1>
    </revision>
    <revision>
      <id>23687</id>
      <parentid>23686</parentid>
      <timestamp>2016-05-18T11:57:48Z</timestamp>
      <contributor>
        <username>Arousal</username>
        <id>4444</id>
      </contributor>
      <origin>23687</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5359" sha1="icwd1wnk89x0y81d15kx8sgd7u7s9hr" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
 This is free software, you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|og:image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A [[Tor Browser|web browser]], [[XChat|IRC client]], word processor, and [[Software|more]] come pre-configured with security in mind.

It is a complete operating system&lt;ref&gt;Which consists of two virtual machines: Whonix-Gateway and Whonix-Workstation&lt;/ref&gt; designed to be used inside a host operating system&lt;ref&gt;Such as your currently installed OS on your computer or an OS installed on an external drive.&lt;/ref&gt;. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt; and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;u&gt;Whonix-Workstation&lt;/u&gt; for your work and &lt;u&gt;Whonix-Gateway&lt;/u&gt; for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

Each version of Whonix is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian version'' !! Debian codename
|-
| Whonix &lt;u&gt;12&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>icwd1wnk89x0y81d15kx8sgd7u7s9hr</sha1>
    </revision>
    <revision>
      <id>23688</id>
      <parentid>23687</parentid>
      <timestamp>2016-05-18T12:50:24Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>23688</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5369" sha1="1rk6cf1zk5fewy0h6rd581ezw8oizwg" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|og:image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A [[Tor Browser|web browser]], [[XChat|IRC client]], word processor, and [[Software|more]] come pre-configured with security in mind.

It is a complete operating system&lt;ref&gt;Which consists of two virtual machines: Whonix-Gateway and Whonix-Workstation&lt;/ref&gt; designed to be used inside a host operating system&lt;ref&gt;Such as your currently installed OS on your computer or an OS installed on an external drive.&lt;/ref&gt;. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt; and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;u&gt;Whonix-Workstation&lt;/u&gt; for your work and &lt;u&gt;Whonix-Gateway&lt;/u&gt; for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

Each version of Whonix is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian version'' !! Debian codename
|-
| Whonix &lt;u&gt;12&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>1rk6cf1zk5fewy0h6rd581ezw8oizwg</sha1>
    </revision>
    <revision>
      <id>23838</id>
      <parentid>23688</parentid>
      <timestamp>2016-06-01T14:57:04Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "XChat" to "HexChat"</comment>
      <origin>23838</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5371" sha1="5wl7wquizjhh7ov09i7z9rl3t0zovxh" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|og:image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], word processor, and [[Software|more]] come pre-configured with security in mind.

It is a complete operating system&lt;ref&gt;Which consists of two virtual machines: Whonix-Gateway and Whonix-Workstation&lt;/ref&gt; designed to be used inside a host operating system&lt;ref&gt;Such as your currently installed OS on your computer or an OS installed on an external drive.&lt;/ref&gt;. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt; and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;u&gt;Whonix-Workstation&lt;/u&gt; for your work and &lt;u&gt;Whonix-Gateway&lt;/u&gt; for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

Each version of Whonix is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian version'' !! Debian codename
|-
| Whonix &lt;u&gt;12&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>5wl7wquizjhh7ov09i7z9rl3t0zovxh</sha1>
    </revision>
    <revision>
      <id>25498</id>
      <parentid>23838</parentid>
      <timestamp>2016-08-21T19:49:27Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Based on Debian */</comment>
      <origin>25498</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5371" sha1="kpgm4bejkqb3hm3s47t6z81mxp1bdh7" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|og:image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], word processor, and [[Software|more]] come pre-configured with security in mind.

It is a complete operating system&lt;ref&gt;Which consists of two virtual machines: Whonix-Gateway and Whonix-Workstation&lt;/ref&gt; designed to be used inside a host operating system&lt;ref&gt;Such as your currently installed OS on your computer or an OS installed on an external drive.&lt;/ref&gt;. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt; and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;u&gt;Whonix-Workstation&lt;/u&gt; for your work and &lt;u&gt;Whonix-Gateway&lt;/u&gt; for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

Each version of Whonix is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian version'' !! Debian codename
|-
| Whonix &lt;u&gt;13&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>kpgm4bejkqb3hm3s47t6z81mxp1bdh7</sha1>
    </revision>
    <revision>
      <id>25499</id>
      <parentid>25498</parentid>
      <timestamp>2016-08-21T19:50:08Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Based on Debian */</comment>
      <origin>25499</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5383" sha1="mydqyhjkkk72f2qjbmrynnnd3wnt8qy" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|og:image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], word processor, and [[Software|more]] come pre-configured with security in mind.

It is a complete operating system&lt;ref&gt;Which consists of two virtual machines: Whonix-Gateway and Whonix-Workstation&lt;/ref&gt; designed to be used inside a host operating system&lt;ref&gt;Such as your currently installed OS on your computer or an OS installed on an external drive.&lt;/ref&gt;. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt; and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;u&gt;Whonix-Workstation&lt;/u&gt; for your work and &lt;u&gt;Whonix-Gateway&lt;/u&gt; for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

Each version of Whonix is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian version'' !! Debian codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>mydqyhjkkk72f2qjbmrynnnd3wnt8qy</sha1>
    </revision>
    <revision>
      <id>27178</id>
      <parentid>25499</parentid>
      <timestamp>2017-01-03T22:16:30Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "|og:image=" to "|image="</comment>
      <origin>27178</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5380" sha1="sp3hlvxlcmnbpex12xujrh2na5hq531" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], word processor, and [[Software|more]] come pre-configured with security in mind.

It is a complete operating system&lt;ref&gt;Which consists of two virtual machines: Whonix-Gateway and Whonix-Workstation&lt;/ref&gt; designed to be used inside a host operating system&lt;ref&gt;Such as your currently installed OS on your computer or an OS installed on an external drive.&lt;/ref&gt;. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt; and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;u&gt;Whonix-Workstation&lt;/u&gt; for your work and &lt;u&gt;Whonix-Gateway&lt;/u&gt; for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

Each version of Whonix is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian version'' !! Debian codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Footnotes / References =
&lt;references /&gt;

= License =

&lt;pre&gt;Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;

This program comes with ABSOLUTELY NO WARRANTY; for details see the wiki source code.
This is free software, and you are welcome to redistribute it
under certain conditions; see the wiki source code for details.&lt;/pre&gt;
{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>sp3hlvxlcmnbpex12xujrh2na5hq531</sha1>
    </revision>
    <revision>
      <id>28985</id>
      <parentid>27178</parentid>
      <timestamp>2017-04-16T13:52:53Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* License */</comment>
      <origin>28985</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5033" sha1="8x558b4i8um2yxdlwmaderrqntdbfm7" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], word processor, and [[Software|more]] come pre-configured with security in mind.

It is a complete operating system&lt;ref&gt;Which consists of two virtual machines: Whonix-Gateway and Whonix-Workstation&lt;/ref&gt; designed to be used inside a host operating system&lt;ref&gt;Such as your currently installed OS on your computer or an OS installed on an external drive.&lt;/ref&gt;. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt; and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;u&gt;Whonix-Workstation&lt;/u&gt; for your work and &lt;u&gt;Whonix-Gateway&lt;/u&gt; for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

Each version of Whonix is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian version'' !! Debian codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Footnotes / References =
&lt;references /&gt;

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>8x558b4i8um2yxdlwmaderrqntdbfm7</sha1>
    </revision>
    <revision>
      <id>29010</id>
      <parentid>28985</parentid>
      <timestamp>2017-04-16T13:57:19Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "Copyright (C) 2012 -2014 Patrick Schleizer &lt;adrelanos@riseup.net&gt;" to "Copyright (C) 2012 - 2017 Patrick Schleizer &lt;adrelanos@riseup.net&gt;"</comment>
      <origin>29010</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5034" sha1="msi88dxy4vckwl9csyzpovmjxm7z8a3" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2017 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], word processor, and [[Software|more]] come pre-configured with security in mind.

It is a complete operating system&lt;ref&gt;Which consists of two virtual machines: Whonix-Gateway and Whonix-Workstation&lt;/ref&gt; designed to be used inside a host operating system&lt;ref&gt;Such as your currently installed OS on your computer or an OS installed on an external drive.&lt;/ref&gt;. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt; and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;u&gt;Whonix-Workstation&lt;/u&gt; for your work and &lt;u&gt;Whonix-Gateway&lt;/u&gt; for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

Each version of Whonix is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian version'' !! Debian codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Footnotes / References =
&lt;references /&gt;

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>msi88dxy4vckwl9csyzpovmjxm7z8a3</sha1>
    </revision>
    <revision>
      <id>29822</id>
      <parentid>29010</parentid>
      <timestamp>2017-05-02T16:52:08Z</timestamp>
      <contributor>
        <username>Ego</username>
        <id>4405</id>
      </contributor>
      <origin>29822</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5060" sha1="77hd3y1r291q3fcot8ax10z6neogkx9" xml:space="preserve">&lt;translate&gt;

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2017 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], word processor, and [[Software|more]] come pre-configured with security in mind.

It is a complete operating system&lt;ref&gt;Which consists of two virtual machines: Whonix-Gateway and Whonix-Workstation&lt;/ref&gt; designed to be used inside a host operating system&lt;ref&gt;Such as your currently installed OS on your computer or an OS installed on an external drive.&lt;/ref&gt;. It is Free Software and based on Tor&lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux&lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt; and security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;u&gt;Whonix-Workstation&lt;/u&gt; for your work and &lt;u&gt;Whonix-Gateway&lt;/u&gt; for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

Each version of Whonix is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian version'' !! Debian codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Footnotes / References =
&lt;references /&gt;

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]
&lt;/translate&gt;</text>
      <sha1>77hd3y1r291q3fcot8ax10z6neogkx9</sha1>
    </revision>
    <revision>
      <id>30092</id>
      <parentid>29822</parentid>
      <timestamp>2017-05-17T07:17:16Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>/* Introduction */</comment>
      <origin>30092</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5322" sha1="9387glrb2lg34t9lyram6y1o8alfxva" xml:space="preserve">&lt;translate&gt;

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2017 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|word processor]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines - Whonix-Gateway and Whonix-Workstation - which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OS's installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is Free Software and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;u&gt;Whonix-Workstation&lt;/u&gt; for your work and &lt;u&gt;Whonix-Gateway&lt;/u&gt; for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

Each version of Whonix is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian version'' !! Debian codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Footnotes / References =
&lt;references /&gt;

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]
&lt;/translate&gt;</text>
      <sha1>9387glrb2lg34t9lyram6y1o8alfxva</sha1>
    </revision>
    <revision>
      <id>30093</id>
      <parentid>30092</parentid>
      <timestamp>2017-05-17T07:20:26Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>/* Security by Isolation */</comment>
      <origin>30093</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5332" sha1="2e74y1odtiildag7dmun1ql556mgjrm" xml:space="preserve">&lt;translate&gt;

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2017 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|word processor]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines - Whonix-Gateway and Whonix-Workstation - which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OS's installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is Free Software and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;i&gt;Whonix-Workstation&lt;/i&gt; for work activities and &lt;i&gt;Whonix-Gateway&lt;/i&gt; to enforce all Internet traffic routing via the Tor network. This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

Each version of Whonix is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian version'' !! Debian codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Footnotes / References =
&lt;references /&gt;

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]
&lt;/translate&gt;</text>
      <sha1>2e74y1odtiildag7dmun1ql556mgjrm</sha1>
    </revision>
    <revision>
      <id>30094</id>
      <parentid>30093</parentid>
      <timestamp>2017-05-17T07:22:05Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>/* Introduction */</comment>
      <origin>30094</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5364" sha1="9l2hehko02xoah9zy26y8vfy70l77oo" xml:space="preserve">&lt;translate&gt;

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2017 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|word processor]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines - Whonix-Gateway and Whonix-Workstation - which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OS's installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;i&gt;Whonix-Workstation&lt;/i&gt; for work activities and &lt;i&gt;Whonix-Gateway&lt;/i&gt; to enforce all Internet traffic routing via the Tor network. This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Anonymity online through Tor =

Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.

To learn more about Tor, see the official [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How does Tor work]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

Each version of Whonix is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian version'' !! Debian codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Footnotes / References =
&lt;references /&gt;

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]
&lt;/translate&gt;</text>
      <sha1>9l2hehko02xoah9zy26y8vfy70l77oo</sha1>
    </revision>
    <revision>
      <id>30095</id>
      <parentid>30094</parentid>
      <timestamp>2017-05-17T07:32:46Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>/* Anonymity online through Tor */</comment>
      <origin>30095</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5787" sha1="4gdhfelssp4tv25itrpmg54h0zyynyx" xml:space="preserve">&lt;translate&gt;

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2017 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|word processor]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines - Whonix-Gateway and Whonix-Workstation - which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OS's installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;i&gt;Whonix-Workstation&lt;/i&gt; for work activities and &lt;i&gt;Whonix-Gateway&lt;/i&gt; to enforce all Internet traffic routing via the Tor network. This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protects users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

Each version of Whonix is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian version'' !! Debian codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Footnotes / References =
&lt;references /&gt;

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]
&lt;/translate&gt;</text>
      <sha1>4gdhfelssp4tv25itrpmg54h0zyynyx</sha1>
    </revision>
    <revision>
      <id>30097</id>
      <parentid>30095</parentid>
      <timestamp>2017-05-17T07:38:37Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>/* Based on Debian */</comment>
      <origin>30097</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5799" sha1="10en7iidz2muhsciatvlo9rpsse9j90" xml:space="preserve">&lt;translate&gt;

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2017 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|word processor]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines - Whonix-Gateway and Whonix-Workstation - which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OS's installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;i&gt;Whonix-Workstation&lt;/i&gt; for work activities and &lt;i&gt;Whonix-Gateway&lt;/i&gt; to enforce all Internet traffic routing via the Tor network. This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protects users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}
&lt;br /&gt;
Each version of Whonix is based on a particular version of Debian:
&lt;br /&gt;
{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

= Summary =

== Whonix is ==

* A free and open operating system
* An anti-censorship tool
* The first step among many in hiding your identity

== Whonix helps to == 

* Hide your IP address
* Prevent your ISP from spying on you
* Prevent websites from identifying you
* Prevent malware from identifying you
* Circumvent censorship

== Whonix is not ==

* A One-Click-Anonymization-Solution

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Footnotes / References =
&lt;references /&gt;

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]
&lt;/translate&gt;</text>
      <sha1>10en7iidz2muhsciatvlo9rpsse9j90</sha1>
    </revision>
    <revision>
      <id>30098</id>
      <parentid>30097</parentid>
      <timestamp>2017-05-17T07:42:20Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>/* Summary */</comment>
      <origin>30098</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5813" sha1="qusnykozij7wyfraq1jfojawbbhdibf" xml:space="preserve">&lt;translate&gt;

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2017 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|word processor]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines - Whonix-Gateway and Whonix-Workstation - which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OS's installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;i&gt;Whonix-Workstation&lt;/i&gt; for work activities and &lt;i&gt;Whonix-Gateway&lt;/i&gt; to enforce all Internet traffic routing via the Tor network. This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protects users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}
&lt;br /&gt;
Each version of Whonix is based on a particular version of Debian:
&lt;br /&gt;
{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= What's next? =

To continue discovering Whonix, you can now read:

* the [[Warning]] page to understand better the security limitations of Whonix and Tor,
* more details about the [[Features]] of Whonix,
* our [[Documentation]] explaining in details how to use Whonix,
* some hints on why should you [[Trust]] Whonix or not,
* our [[Security Guide]] and [[Design]] document about Whonix specification, threat model and implementation.

= Footnotes / References =
&lt;references /&gt;

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]
&lt;/translate&gt;</text>
      <sha1>qusnykozij7wyfraq1jfojawbbhdibf</sha1>
    </revision>
    <revision>
      <id>30099</id>
      <parentid>30098</parentid>
      <timestamp>2017-05-17T07:56:11Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>/* What's next? */</comment>
      <origin>30099</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5993" sha1="ckaufrl0bz3kty8nl33h3wa51vejj3q" xml:space="preserve">&lt;translate&gt;

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2017 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|word processor]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines - Whonix-Gateway and Whonix-Workstation - which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OS's installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;i&gt;Whonix-Workstation&lt;/i&gt; for work activities and &lt;i&gt;Whonix-Gateway&lt;/i&gt; to enforce all Internet traffic routing via the Tor network. This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protects users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}
&lt;br /&gt;
Each version of Whonix is based on a particular version of Debian:
&lt;br /&gt;
{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

To learn more about Whonix and to determine whether it is a suitable solution in your circumstances, the user is recommended to read:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The [[Security_Guide|Security Guide]], [[Advanced_Security_Guide|Advanced Security Guide]] and [[Design]] documents detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation]] entries explaining in detail how to use Whonix safely.

= Footnotes / References =
&lt;references /&gt;

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]
&lt;/translate&gt;</text>
      <sha1>ckaufrl0bz3kty8nl33h3wa51vejj3q</sha1>
    </revision>
    <revision>
      <id>30100</id>
      <parentid>30099</parentid>
      <timestamp>2017-05-17T07:56:50Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>/* Whonix helps to */</comment>
      <origin>30100</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5993" sha1="192i4p6rl8cmbef9tbw6uhuc0pwj0pt" xml:space="preserve">&lt;translate&gt;

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2017 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|word processor]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines - Whonix-Gateway and Whonix-Workstation - which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OS's installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;i&gt;Whonix-Workstation&lt;/i&gt; for work activities and &lt;i&gt;Whonix-Gateway&lt;/i&gt; to enforce all Internet traffic routing via the Tor network. This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protects users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}
&lt;br /&gt;
Each version of Whonix is based on a particular version of Debian:
&lt;br /&gt;
{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

To learn more about Whonix and to determine whether it is a suitable solution in your circumstances, the user is recommended to read:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The [[Security_Guide|Security Guide]], [[Advanced_Security_Guide|Advanced Security Guide]] and [[Design]] documents detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation]] entries explaining in detail how to use Whonix safely.

= Footnotes / References =
&lt;references /&gt;

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]
&lt;/translate&gt;</text>
      <sha1>192i4p6rl8cmbef9tbw6uhuc0pwj0pt</sha1>
    </revision>
    <revision>
      <id>30449</id>
      <parentid>30100</parentid>
      <timestamp>2017-05-28T21:38:39Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Based on Debian */</comment>
      <origin>30449</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="6013" sha1="by75wzdz942h4mnqymr0449wcogzge5" xml:space="preserve">&lt;translate&gt;

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2017 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|word processor]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines - Whonix-Gateway and Whonix-Workstation - which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OS's installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;i&gt;Whonix-Workstation&lt;/i&gt; for work activities and &lt;i&gt;Whonix-Gateway&lt;/i&gt; to enforce all Internet traffic routing via the Tor network. This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protects users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix version =
&lt;br /&gt;
Each version of Whonix is based on a particular version of Debian:
&lt;br /&gt;
{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

To learn more about Whonix and to determine whether it is a suitable solution in your circumstances, the user is recommended to read:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The [[Security_Guide|Security Guide]], [[Advanced_Security_Guide|Advanced Security Guide]] and [[Design]] documents detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation]] entries explaining in detail how to use Whonix safely.

= Footnotes / References =
&lt;references /&gt;

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]
&lt;/translate&gt;</text>
      <sha1>by75wzdz942h4mnqymr0449wcogzge5</sha1>
    </revision>
    <revision>
      <id>30450</id>
      <parentid>30449</parentid>
      <timestamp>2017-05-28T21:39:07Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Whonix version */</comment>
      <origin>30450</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="6000" sha1="gqrzr9c7rwficw6ee7jjzcvnlokf0ff" xml:space="preserve">&lt;translate&gt;

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2017 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|word processor]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines - Whonix-Gateway and Whonix-Workstation - which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OS's installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;i&gt;Whonix-Workstation&lt;/i&gt; for work activities and &lt;i&gt;Whonix-Gateway&lt;/i&gt; to enforce all Internet traffic routing via the Tor network. This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protects users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix version =
Each version of Whonix is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

To learn more about Whonix and to determine whether it is a suitable solution in your circumstances, the user is recommended to read:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The [[Security_Guide|Security Guide]], [[Advanced_Security_Guide|Advanced Security Guide]] and [[Design]] documents detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation]] entries explaining in detail how to use Whonix safely.

= Footnotes / References =
&lt;references /&gt;

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]
&lt;/translate&gt;</text>
      <sha1>gqrzr9c7rwficw6ee7jjzcvnlokf0ff</sha1>
    </revision>
    <revision>
      <id>30451</id>
      <parentid>30450</parentid>
      <timestamp>2017-05-29T04:11:45Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>/* Whonix version */</comment>
      <origin>30451</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5997" sha1="10sqfk90dtc8chl7uag4exnkxwooa3u" xml:space="preserve">&lt;translate&gt;

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2017 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|word processor]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines - Whonix-Gateway and Whonix-Workstation - which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OS's installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;i&gt;Whonix-Workstation&lt;/i&gt; for work activities and &lt;i&gt;Whonix-Gateway&lt;/i&gt; to enforce all Internet traffic routing via the Tor network. This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protects users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

To learn more about Whonix and to determine whether it is a suitable solution in your circumstances, the user is recommended to read:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The [[Security_Guide|Security Guide]], [[Advanced_Security_Guide|Advanced Security Guide]] and [[Design]] documents detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation]] entries explaining in detail how to use Whonix safely.

= Footnotes / References =
&lt;references /&gt;

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]
&lt;/translate&gt;</text>
      <sha1>10sqfk90dtc8chl7uag4exnkxwooa3u</sha1>
    </revision>
    <revision>
      <id>30512</id>
      <parentid>30451</parentid>
      <timestamp>2017-06-01T08:05:26Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>/* Whonix Version */</comment>
      <origin>30512</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="6352" sha1="80ye57d35xqi039yprrn7asyhhkc4to" xml:space="preserve">&lt;translate&gt;

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2017 Patrick Schleizer &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|word processor]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines - Whonix-Gateway and Whonix-Workstation - which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OS's installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;i&gt;Whonix-Workstation&lt;/i&gt; for work activities and &lt;i&gt;Whonix-Gateway&lt;/i&gt; to enforce all Internet traffic routing via the Tor network. This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protects users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

Note that there is not a specific, fixed Whonix release schedule. A new stable release only become available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] to track developer progress. &lt;ref&gt;For example, for the next release use the tag "Whonix 14" and status "Open".&lt;/ref&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

To learn more about Whonix and to determine whether it is a suitable solution in your circumstances, the user is recommended to read:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The [[Security_Guide|Security Guide]], [[Advanced_Security_Guide|Advanced Security Guide]] and [[Design]] documents detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation]] entries explaining in detail how to use Whonix safely.

= Footnotes / References =
&lt;references /&gt;

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]
&lt;/translate&gt;</text>
      <sha1>80ye57d35xqi039yprrn7asyhhkc4to</sha1>
    </revision>
    <revision>
      <id>32199</id>
      <parentid>30512</parentid>
      <timestamp>2018-01-29T15:47:58Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "2017 Patrick Schleizer &lt;adrelanos@riseup.net&gt;" to "2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;"</comment>
      <origin>32199</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="6355" sha1="gf7ih6svld4w63z8nx89yrfxv47flfe" xml:space="preserve">&lt;translate&gt;

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|word processor]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines - Whonix-Gateway and Whonix-Workstation - which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OS's installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;i&gt;Whonix-Workstation&lt;/i&gt; for work activities and &lt;i&gt;Whonix-Gateway&lt;/i&gt; to enforce all Internet traffic routing via the Tor network. This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protects users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

Note that there is not a specific, fixed Whonix release schedule. A new stable release only become available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] to track developer progress. &lt;ref&gt;For example, for the next release use the tag "Whonix 14" and status "Open".&lt;/ref&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

To learn more about Whonix and to determine whether it is a suitable solution in your circumstances, the user is recommended to read:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The [[Security_Guide|Security Guide]], [[Advanced_Security_Guide|Advanced Security Guide]] and [[Design]] documents detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation]] entries explaining in detail how to use Whonix safely.

= Footnotes / References =
&lt;references /&gt;

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]
&lt;/translate&gt;</text>
      <sha1>gf7ih6svld4w63z8nx89yrfxv47flfe</sha1>
    </revision>
    <revision>
      <id>32352</id>
      <parentid>32199</parentid>
      <timestamp>2018-02-03T14:01:48Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "&lt;translate&gt;" to ""</comment>
      <origin>32352</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="6344" sha1="izduj1202x86e9qlzi31pv1qhym5u4k" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|word processor]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines - Whonix-Gateway and Whonix-Workstation - which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OS's installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;i&gt;Whonix-Workstation&lt;/i&gt; for work activities and &lt;i&gt;Whonix-Gateway&lt;/i&gt; to enforce all Internet traffic routing via the Tor network. This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protects users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

Note that there is not a specific, fixed Whonix release schedule. A new stable release only become available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] to track developer progress. &lt;ref&gt;For example, for the next release use the tag "Whonix 14" and status "Open".&lt;/ref&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

To learn more about Whonix and to determine whether it is a suitable solution in your circumstances, the user is recommended to read:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The [[Security_Guide|Security Guide]], [[Advanced_Security_Guide|Advanced Security Guide]] and [[Design]] documents detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation]] entries explaining in detail how to use Whonix safely.

= Footnotes / References =
&lt;references /&gt;

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]
&lt;/translate&gt;</text>
      <sha1>izduj1202x86e9qlzi31pv1qhym5u4k</sha1>
    </revision>
    <revision>
      <id>32419</id>
      <parentid>32352</parentid>
      <timestamp>2018-02-03T14:02:59Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "&lt;/translate&gt;" to ""</comment>
      <origin>32419</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="6331" sha1="ctq3ow548hmjogay0dxbvxgz9u79eyn" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|word processor]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines - Whonix-Gateway and Whonix-Workstation - which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OS's installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;i&gt;Whonix-Workstation&lt;/i&gt; for work activities and &lt;i&gt;Whonix-Gateway&lt;/i&gt; to enforce all Internet traffic routing via the Tor network. This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protects users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

Note that there is not a specific, fixed Whonix release schedule. A new stable release only become available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] to track developer progress. &lt;ref&gt;For example, for the next release use the tag "Whonix 14" and status "Open".&lt;/ref&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

To learn more about Whonix and to determine whether it is a suitable solution in your circumstances, the user is recommended to read:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The [[Security_Guide|Security Guide]], [[Advanced_Security_Guide|Advanced Security Guide]] and [[Design]] documents detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation]] entries explaining in detail how to use Whonix safely.

= Footnotes / References =
&lt;references /&gt;

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>ctq3ow548hmjogay0dxbvxgz9u79eyn</sha1>
    </revision>
    <revision>
      <id>33174</id>
      <parentid>32419</parentid>
      <timestamp>2018-02-22T10:03:36Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>Standardize to "Footnotes" everywhere in wiki</comment>
      <origin>33174</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="6318" sha1="37rdek2w3yzc5cr2wst797ql5fcadt1" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|word processor]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines - Whonix-Gateway and Whonix-Workstation - which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OS's installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;i&gt;Whonix-Workstation&lt;/i&gt; for work activities and &lt;i&gt;Whonix-Gateway&lt;/i&gt; to enforce all Internet traffic routing via the Tor network. This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protects users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

Note that there is not a specific, fixed Whonix release schedule. A new stable release only become available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] to track developer progress. &lt;ref&gt;For example, for the next release use the tag "Whonix 14" and status "Open".&lt;/ref&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

To learn more about Whonix and to determine whether it is a suitable solution in your circumstances, the user is recommended to read:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The [[Security_Guide|Security Guide]], [[Advanced_Security_Guide|Advanced Security Guide]] and [[Design]] documents detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation]] entries explaining in detail how to use Whonix safely.

= Footnotes =
&lt;references /&gt;

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>37rdek2w3yzc5cr2wst797ql5fcadt1</sha1>
    </revision>
    <revision>
      <id>33767</id>
      <parentid>33174</parentid>
      <timestamp>2018-05-06T14:41:06Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>/* Online Anonymity via Tor */</comment>
      <origin>33767</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="6317" sha1="8ek79rnigvjv12dpmudeyiqgmhz0kpr" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|word processor]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines - Whonix-Gateway and Whonix-Workstation - which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OS's installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;i&gt;Whonix-Workstation&lt;/i&gt; for work activities and &lt;i&gt;Whonix-Gateway&lt;/i&gt; to enforce all Internet traffic routing via the Tor network. This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

Note that there is not a specific, fixed Whonix release schedule. A new stable release only become available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] to track developer progress. &lt;ref&gt;For example, for the next release use the tag "Whonix 14" and status "Open".&lt;/ref&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

To learn more about Whonix and to determine whether it is a suitable solution in your circumstances, the user is recommended to read:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The [[Security_Guide|Security Guide]], [[Advanced_Security_Guide|Advanced Security Guide]] and [[Design]] documents detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation]] entries explaining in detail how to use Whonix safely.

= Footnotes =
&lt;references /&gt;

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>8ek79rnigvjv12dpmudeyiqgmhz0kpr</sha1>
    </revision>
    <revision>
      <id>33868</id>
      <parentid>33767</parentid>
      <timestamp>2018-05-23T11:14:19Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>/* Introduction */</comment>
      <origin>33868</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="6317" sha1="36cdl63en13fd9jngdx77lg3x558pnc" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|word processor]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines - Whonix-Gateway and Whonix-Workstation - which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;i&gt;Whonix-Workstation&lt;/i&gt; for work activities and &lt;i&gt;Whonix-Gateway&lt;/i&gt; to enforce all Internet traffic routing via the Tor network. This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

Note that there is not a specific, fixed Whonix release schedule. A new stable release only become available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] to track developer progress. &lt;ref&gt;For example, for the next release use the tag "Whonix 14" and status "Open".&lt;/ref&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

To learn more about Whonix and to determine whether it is a suitable solution in your circumstances, the user is recommended to read:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The [[Security_Guide|Security Guide]], [[Advanced_Security_Guide|Advanced Security Guide]] and [[Design]] documents detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation]] entries explaining in detail how to use Whonix safely.

= Footnotes =
&lt;references /&gt;

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>36cdl63en13fd9jngdx77lg3x558pnc</sha1>
    </revision>
    <revision>
      <id>33869</id>
      <parentid>33868</parentid>
      <timestamp>2018-05-23T11:16:07Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>/* Whonix Version */</comment>
      <origin>33869</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="6318" sha1="fm8aq55nldp5hh3p9jq4uba1h9g7k35" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|word processor]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines - Whonix-Gateway and Whonix-Workstation - which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;i&gt;Whonix-Workstation&lt;/i&gt; for work activities and &lt;i&gt;Whonix-Gateway&lt;/i&gt; to enforce all Internet traffic routing via the Tor network. This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

Note that there is not a specific, fixed Whonix release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] to track developer progress. &lt;ref&gt;For example, for the next release use the tag "Whonix 14" and status "Open".&lt;/ref&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

To learn more about Whonix and to determine whether it is a suitable solution in your circumstances, the user is recommended to read:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The [[Security_Guide|Security Guide]], [[Advanced_Security_Guide|Advanced Security Guide]] and [[Design]] documents detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation]] entries explaining in detail how to use Whonix safely.

= Footnotes =
&lt;references /&gt;

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>fm8aq55nldp5hh3p9jq4uba1h9g7k35</sha1>
    </revision>
    <revision>
      <id>33870</id>
      <parentid>33869</parentid>
      <timestamp>2018-05-23T11:20:14Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>/* Next Steps */</comment>
      <origin>33870</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="6336" sha1="65iqo86qtsz9pfxlfqcuxxrh8myqcto" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|word processor]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines - Whonix-Gateway and Whonix-Workstation - which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;i&gt;Whonix-Workstation&lt;/i&gt; for work activities and &lt;i&gt;Whonix-Gateway&lt;/i&gt; to enforce all Internet traffic routing via the Tor network. This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

Note that there is not a specific, fixed Whonix release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] to track developer progress. &lt;ref&gt;For example, for the next release use the tag "Whonix 14" and status "Open".&lt;/ref&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The [[Security_Guide|Security Guide]], [[Advanced_Security_Guide|Advanced Security Guide]] and [[Design]] documents detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|entries]] explaining how to use Whonix safely.

= Footnotes =
&lt;references /&gt;

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>65iqo86qtsz9pfxlfqcuxxrh8myqcto</sha1>
    </revision>
    <revision>
      <id>33871</id>
      <parentid>33870</parentid>
      <timestamp>2018-05-23T11:22:16Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>/* Whonix Version */</comment>
      <origin>33871</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="6327" sha1="4f1kb8eq8i9icngkgysc089qg280x7w" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|word processor]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines - Whonix-Gateway and Whonix-Workstation - which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two parts: &lt;i&gt;Whonix-Workstation&lt;/i&gt; for work activities and &lt;i&gt;Whonix-Gateway&lt;/i&gt; to enforce all Internet traffic routing via the Tor network. This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] to track developer progress. &lt;ref&gt;For example, for the next release use the tag "Whonix 14" and status "Open".&lt;/ref&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The [[Security_Guide|Security Guide]], [[Advanced_Security_Guide|Advanced Security Guide]] and [[Design]] documents detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|entries]] explaining how to use Whonix safely.

= Footnotes =
&lt;references /&gt;

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>4f1kb8eq8i9icngkgysc089qg280x7w</sha1>
    </revision>
    <revision>
      <id>34156</id>
      <parentid>33871</parentid>
      <timestamp>2018-06-23T01:38:54Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>/* Security by Isolation */</comment>
      <origin>34156</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="6431" sha1="ki86baoffq3cos79bebowy8e010a0x2" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|word processor]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines - Whonix-Gateway and Whonix-Workstation - which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] to track developer progress. &lt;ref&gt;For example, for the next release use the tag "Whonix 14" and status "Open".&lt;/ref&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The [[Security_Guide|Security Guide]], [[Advanced_Security_Guide|Advanced Security Guide]] and [[Design]] documents detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|entries]] explaining how to use Whonix safely.

= Footnotes =
&lt;references /&gt;

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>ki86baoffq3cos79bebowy8e010a0x2</sha1>
    </revision>
    <revision>
      <id>34157</id>
      <parentid>34156</parentid>
      <timestamp>2018-06-23T01:40:30Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>Figure title</comment>
      <origin>34157</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="6481" sha1="ldln66gp0oxfr2m0cf6jhz0zfftx91r" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|word processor]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines - Whonix-Gateway and Whonix-Workstation - which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] to track developer progress. &lt;ref&gt;For example, for the next release use the tag "Whonix 14" and status "Open".&lt;/ref&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The [[Security_Guide|Security Guide]], [[Advanced_Security_Guide|Advanced Security Guide]] and [[Design]] documents detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|entries]] explaining how to use Whonix safely.

= Footnotes =
&lt;references /&gt;

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>ldln66gp0oxfr2m0cf6jhz0zfftx91r</sha1>
    </revision>
    <revision>
      <id>34158</id>
      <parentid>34157</parentid>
      <timestamp>2018-06-23T01:43:02Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>/* Next Steps */</comment>
      <origin>34158</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="6480" sha1="9trzi9zwpl2xyibyoyu2cqk94r3794k" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|word processor]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines - Whonix-Gateway and Whonix-Workstation - which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] to track developer progress. &lt;ref&gt;For example, for the next release use the tag "Whonix 14" and status "Open".&lt;/ref&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The [[Security_Guide|Security Guide]], [[Advanced_Security_Guide|Advanced Security Guide]] and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|entries]] explaining how to use Whonix safely.

= Footnotes =
&lt;references /&gt;

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>9trzi9zwpl2xyibyoyu2cqk94r3794k</sha1>
    </revision>
    <revision>
      <id>34159</id>
      <parentid>34158</parentid>
      <timestamp>2018-06-23T01:43:34Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>/* Introduction */</comment>
      <origin>34159</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="6482" sha1="kc72s9de5c2lw4sa6sxop5jgt4ekd7y" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|word processor]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|}

Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] to track developer progress. &lt;ref&gt;For example, for the next release use the tag "Whonix 14" and status "Open".&lt;/ref&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The [[Security_Guide|Security Guide]], [[Advanced_Security_Guide|Advanced Security Guide]] and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|entries]] explaining how to use Whonix safely.

= Footnotes =
&lt;references /&gt;

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>kc72s9de5c2lw4sa6sxop5jgt4ekd7y</sha1>
    </revision>
    <revision>
      <id>34638</id>
      <parentid>34159</parentid>
      <timestamp>2018-07-15T07:01:31Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Whonix Version */</comment>
      <origin>34638</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="6566" sha1="38cdqrz6avaqb083codvvs2d5929lae" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|word processor]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|-
| Whonix &lt;u&gt;14&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/jessie/ stretch]
|}

Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] to track developer progress. &lt;ref&gt;For example, for the next release use the tag "Whonix 14" and status "Open".&lt;/ref&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The [[Security_Guide|Security Guide]], [[Advanced_Security_Guide|Advanced Security Guide]] and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|entries]] explaining how to use Whonix safely.

= Footnotes =
&lt;references /&gt;

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>38cdqrz6avaqb083codvvs2d5929lae</sha1>
    </revision>
    <revision>
      <id>34859</id>
      <parentid>34638</parentid>
      <timestamp>2018-07-28T07:42:44Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>/* Introduction */</comment>
      <origin>34859</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="6564" sha1="1h8k667qta4gqldejee7eyf0eixva8x" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|-
| Whonix &lt;u&gt;14&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/jessie/ stretch]
|}

Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] to track developer progress. &lt;ref&gt;For example, for the next release use the tag "Whonix 14" and status "Open".&lt;/ref&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The [[Security_Guide|Security Guide]], [[Advanced_Security_Guide|Advanced Security Guide]] and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|entries]] explaining how to use Whonix safely.

= Footnotes =
&lt;references /&gt;

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>1h8k667qta4gqldejee7eyf0eixva8x</sha1>
    </revision>
    <revision>
      <id>34864</id>
      <parentid>34859</parentid>
      <timestamp>2018-07-28T08:10:26Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>/* Whonix Version */</comment>
      <origin>34864</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="6607" sha1="ie6c9yztvts11sn4nksjo5e23cl52a4" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|-
| Whonix &lt;u&gt;14&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/jessie/ stretch]
|}

Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 14" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress.

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The [[Security_Guide|Security Guide]], [[Advanced_Security_Guide|Advanced Security Guide]] and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|entries]] explaining how to use Whonix safely.

= Footnotes =
&lt;references /&gt;

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>ie6c9yztvts11sn4nksjo5e23cl52a4</sha1>
    </revision>
    <revision>
      <id>34868</id>
      <parentid>34864</parentid>
      <timestamp>2018-07-28T08:31:16Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>Fix links</comment>
      <origin>34868</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="6566" sha1="gobdv45x83rtymk5ghoyjv7xdsm5tkf" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|-
| Whonix &lt;u&gt;14&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/jessie/ stretch]
|}

Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 14" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress.

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|documentation]] explaining how to use Whonix safely.

= Footnotes =
&lt;references /&gt;

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>gobdv45x83rtymk5ghoyjv7xdsm5tkf</sha1>
    </revision>
    <revision>
      <id>35122</id>
      <parentid>34868</parentid>
      <timestamp>2018-08-01T05:08:04Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "&lt;references /&gt;" to "{{reflist|close=1}}"</comment>
      <origin>35122</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="6571" sha1="5dmdlbgnembqb5nb6z2u5o5gzfvmhou" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''8'' || [https://www.debian.org/releases/jessie/ jessie]
|-
| Whonix &lt;u&gt;14&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/jessie/ stretch]
|}

Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 14" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress.

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|documentation]] explaining how to use Whonix safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>5dmdlbgnembqb5nb6z2u5o5gzfvmhou</sha1>
    </revision>
    <revision>
      <id>35591</id>
      <parentid>35122</parentid>
      <timestamp>2018-08-09T21:34:45Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>Fix</comment>
      <origin>35591</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="6489" sha1="mui27ca2q7kumcqkseirm3tyi99hmab" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress.

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|documentation]] explaining how to use Whonix safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>mui27ca2q7kumcqkseirm3tyi99hmab</sha1>
    </revision>
    <revision>
      <id>36420</id>
      <parentid>35591</parentid>
      <timestamp>2018-09-01T10:31:36Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>Add Support and notification timeline information</comment>
      <origin>36420</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="7178" sha1="bgyymbcz6r9b9fatxcu8yvcu1ul3pp3" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version, Release and Support Schedule=
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress.

After a new stable release of Whonix, Debian, Qubes or Qubes-Whonix is officially released and announced, the older release is only supported for one month due to limited human resources. &lt;ref&gt;This also relieves Whonix developers from needing to diagnose and support old-stable versions of Qubes/Debian/Whonix, which duplicates the maintenance burden.&lt;/ref&gt; The deprecation notice is provided at least one month in advance and posted in the [http://forums.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion/c/news Whonix News forum]. This means users will need to upgrade the respective platform promptly if they wish to continue using it safely.

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|documentation]] explaining how to use Whonix safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>bgyymbcz6r9b9fatxcu8yvcu1ul3pp3</sha1>
    </revision>
    <revision>
      <id>36431</id>
      <parentid>36420</parentid>
      <timestamp>2018-09-01T14:37:47Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>/* Whonix Version, Release and Support Schedule */</comment>
      <origin>36431</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="7185" sha1="mbytpr4nxrycfn3hzah5qh2zbz1gu8z" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

== Release and Support Schedule ==

Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress.

After a new stable release of Whonix, Debian, Qubes or Qubes-Whonix is officially released and announced, the older release is only supported for one month due to limited human resources. &lt;ref&gt;This also relieves Whonix developers from needing to diagnose and support old-stable versions of Qubes/Debian/Whonix, which duplicates the maintenance burden.&lt;/ref&gt; The deprecation notice is provided at least one month in advance and posted in the [http://forums.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion/c/news Whonix News forum]. This means users will need to upgrade the respective platform promptly if they wish to continue using it safely.

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|documentation]] explaining how to use Whonix safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>mbytpr4nxrycfn3hzah5qh2zbz1gu8z</sha1>
    </revision>
    <revision>
      <id>36809</id>
      <parentid>36431</parentid>
      <timestamp>2018-09-14T11:54:31Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Release and Support Schedule */</comment>
      <origin>36809</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="8292" sha1="aaqwvaqvr7yzqnc58e429vyliga3ab6" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

== Release and Support Schedule ==

Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress.

After a new stable release of Whonix, Debian, Qubes or Qubes-Whonix is officially released and announced, the older release is only supported for one month due to limited human resources. &lt;ref&gt;This also relieves Whonix developers from needing to diagnose and support old-stable versions of Qubes/Debian/Whonix, which duplicates the maintenance burden.&lt;/ref&gt; The deprecation notice is provided at least one month in advance and posted in the [http://forums.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion/c/news Whonix News forum]. This means users will need to upgrade the respective platform promptly if they wish to continue using it safely.

Quote [https://www.qubes-os.org/doc/supported-versions/#whonix Qubes-Whonix version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and Whonix TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, Whonix TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of Whonix TemplateVMs are released, older versions of Whonix TemplateVMs will no longer be supported. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Whonix TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|documentation]] explaining how to use Whonix safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>aaqwvaqvr7yzqnc58e429vyliga3ab6</sha1>
    </revision>
    <revision>
      <id>36810</id>
      <parentid>36809</parentid>
      <timestamp>2018-09-14T11:56:01Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Release and Support Schedule */</comment>
      <origin>36810</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="8332" sha1="l23i3tiit1t3yc2b2e0p2g71itrnp1w" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

== Release and Support Schedule ==
=== Introduction ===
Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress.

After a new stable release of Whonix, Debian, Qubes or Qubes-Whonix is officially released and announced, the older release is only supported for one month due to limited human resources. &lt;ref&gt;This also relieves Whonix developers from needing to diagnose and support old-stable versions of Qubes/Debian/Whonix, which duplicates the maintenance burden.&lt;/ref&gt; The deprecation notice is provided at least one month in advance and posted in the [http://forums.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion/c/news Whonix News forum]. This means users will need to upgrade the respective platform promptly if they wish to continue using it safely.

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix Qubes-Whonix version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and Whonix TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, Whonix TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of Whonix TemplateVMs are released, older versions of Whonix TemplateVMs will no longer be supported. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Whonix TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|documentation]] explaining how to use Whonix safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>l23i3tiit1t3yc2b2e0p2g71itrnp1w</sha1>
    </revision>
    <revision>
      <id>36811</id>
      <parentid>36810</parentid>
      <timestamp>2018-09-14T11:58:47Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Release and Support Schedule */</comment>
      <origin>36811</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="8920" sha1="f7vgv7g8mdovt2ptggbb5o22172ndne" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

== Release and Support Schedule ==
=== Introduction ===
Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress.

After a new stable release of Whonix, Debian, Qubes or Qubes-Whonix is officially released and announced, the older release is only supported for one month due to limited human resources. &lt;ref&gt;This also relieves Whonix developers from needing to diagnose and support old-stable versions of Qubes/Debian/Whonix, which duplicates the maintenance burden.&lt;/ref&gt; The deprecation notice is provided at least one month in advance and posted in the [http://forums.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion/c/news Whonix News forum]. This means users will need to upgrade the respective platform promptly if they wish to continue using it safely.

=== Debian Hosts ===
* One month after a new stable version of Debian is released, Whonix VMs will no longer be supported on any older version of Debian. This means that users who wish to continue using Whonix on Debian must always upgrade to the latest stable Debian version within one month of its release.
* One month after new stable versions of Whonix has been released, older versions of Whonix will no longer be supported. This means that users who wish to continue using Whonix on Debian must always upgrade to the latest stable Whonix version within one month of their release.

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix Qubes-Whonix version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and Whonix TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, Whonix TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of Whonix TemplateVMs are released, older versions of Whonix TemplateVMs will no longer be supported. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Whonix TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|documentation]] explaining how to use Whonix safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>f7vgv7g8mdovt2ptggbb5o22172ndne</sha1>
    </revision>
    <revision>
      <id>36812</id>
      <parentid>36811</parentid>
      <timestamp>2018-09-14T12:02:42Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Release and Support Schedule */</comment>
      <origin>36812</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9038" sha1="bgf0lvglx2542ygmcu2smbcv93sug4r" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

{{Anchor|Release and Support Schedule}}
== Release Schedule ==
Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress.

== Support Schedule ==
=== Debian Hosts ===
* After a new stable release of Whonix, Debian, Qubes or Qubes-Whonix is officially released and announced, the older release is only supported for one month due to limited human resources. &lt;ref&gt;This also relieves Whonix developers from needing to diagnose and support old-stable versions of Qubes/Debian/Whonix, which duplicates the maintenance burden.&lt;/ref&gt; The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news Whonix News forum]. This means users will need to upgrade the respective platform promptly if they wish to continue using it safely.
* One month after a new stable version of Debian is released, Whonix VMs will no longer be supported on any older version of Debian. This means that users who wish to continue using Whonix on Debian must always upgrade to the latest stable Debian version within one month of its release.
* One month after new stable versions of Whonix has been released, older versions of Whonix will no longer be supported. This means that users who wish to continue using Whonix on Debian must always upgrade to the latest stable Whonix version within one month of their release.

=== Debian based and other Hosts ===
Similar to [[#Debian Hosts]].

=== Windows Hosts ===
Mostly undefined. Similar to [[#Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix Qubes-Whonix version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and Whonix TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, Whonix TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of Whonix TemplateVMs are released, older versions of Whonix TemplateVMs will no longer be supported. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Whonix TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|documentation]] explaining how to use Whonix safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>bgf0lvglx2542ygmcu2smbcv93sug4r</sha1>
    </revision>
    <revision>
      <id>36813</id>
      <parentid>36812</parentid>
      <timestamp>2018-09-14T12:03:14Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Release Schedule */</comment>
      <origin>36813</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9036" sha1="rh50tvf5c5yc42i7de2i3usfqs6f9cd" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

{{Anchor|Release and Support Schedule}}
= Release Schedule =
Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress.

== Support Schedule ==
=== Debian Hosts ===
* After a new stable release of Whonix, Debian, Qubes or Qubes-Whonix is officially released and announced, the older release is only supported for one month due to limited human resources. &lt;ref&gt;This also relieves Whonix developers from needing to diagnose and support old-stable versions of Qubes/Debian/Whonix, which duplicates the maintenance burden.&lt;/ref&gt; The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news Whonix News forum]. This means users will need to upgrade the respective platform promptly if they wish to continue using it safely.
* One month after a new stable version of Debian is released, Whonix VMs will no longer be supported on any older version of Debian. This means that users who wish to continue using Whonix on Debian must always upgrade to the latest stable Debian version within one month of its release.
* One month after new stable versions of Whonix has been released, older versions of Whonix will no longer be supported. This means that users who wish to continue using Whonix on Debian must always upgrade to the latest stable Whonix version within one month of their release.

=== Debian based and other Hosts ===
Similar to [[#Debian Hosts]].

=== Windows Hosts ===
Mostly undefined. Similar to [[#Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix Qubes-Whonix version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and Whonix TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, Whonix TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of Whonix TemplateVMs are released, older versions of Whonix TemplateVMs will no longer be supported. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Whonix TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|documentation]] explaining how to use Whonix safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>rh50tvf5c5yc42i7de2i3usfqs6f9cd</sha1>
    </revision>
    <revision>
      <id>36814</id>
      <parentid>36813</parentid>
      <timestamp>2018-09-14T12:03:24Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Support Schedule */</comment>
      <origin>36814</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9034" sha1="58l8skju96opdtyb1pmpnva7vfiiote" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

{{Anchor|Release and Support Schedule}}
= Release Schedule =
Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress.

= Support Schedule =
=== Debian Hosts ===
* After a new stable release of Whonix, Debian, Qubes or Qubes-Whonix is officially released and announced, the older release is only supported for one month due to limited human resources. &lt;ref&gt;This also relieves Whonix developers from needing to diagnose and support old-stable versions of Qubes/Debian/Whonix, which duplicates the maintenance burden.&lt;/ref&gt; The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news Whonix News forum]. This means users will need to upgrade the respective platform promptly if they wish to continue using it safely.
* One month after a new stable version of Debian is released, Whonix VMs will no longer be supported on any older version of Debian. This means that users who wish to continue using Whonix on Debian must always upgrade to the latest stable Debian version within one month of its release.
* One month after new stable versions of Whonix has been released, older versions of Whonix will no longer be supported. This means that users who wish to continue using Whonix on Debian must always upgrade to the latest stable Whonix version within one month of their release.

=== Debian based and other Hosts ===
Similar to [[#Debian Hosts]].

=== Windows Hosts ===
Mostly undefined. Similar to [[#Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix Qubes-Whonix version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and Whonix TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, Whonix TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of Whonix TemplateVMs are released, older versions of Whonix TemplateVMs will no longer be supported. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Whonix TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|documentation]] explaining how to use Whonix safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>58l8skju96opdtyb1pmpnva7vfiiote</sha1>
    </revision>
    <revision>
      <id>36815</id>
      <parentid>36814</parentid>
      <timestamp>2018-09-14T12:05:25Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Release Schedule */</comment>
      <origin>36815</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9050" sha1="mymetj338a96vsh9nnpnrbm9k1g6j4u" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

{{Anchor|Release and Support Schedule}}
= Release Schedule =
Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
* After a new stable release of Whonix, Debian, Qubes or Qubes-Whonix is officially released and announced, the older release is only supported for one month due to limited human resources. &lt;ref&gt;This also relieves Whonix developers from needing to diagnose and support old-stable versions of Qubes/Debian/Whonix, which duplicates the maintenance burden.&lt;/ref&gt; The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news Whonix News forum]. This means users will need to upgrade the respective platform promptly if they wish to continue using it safely.
* One month after a new stable version of Debian is released, Whonix VMs will no longer be supported on any older version of Debian. This means that users who wish to continue using Whonix on Debian must always upgrade to the latest stable Debian version within one month of its release.
* One month after new stable versions of Whonix has been released, older versions of Whonix will no longer be supported. This means that users who wish to continue using Whonix on Debian must always upgrade to the latest stable Whonix version within one month of their release.

=== Debian based and other Hosts ===
Similar to [[#Debian Hosts]].

=== Windows Hosts ===
Mostly undefined. Similar to [[#Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix Qubes-Whonix version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and Whonix TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, Whonix TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of Whonix TemplateVMs are released, older versions of Whonix TemplateVMs will no longer be supported. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Whonix TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|documentation]] explaining how to use Whonix safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>mymetj338a96vsh9nnpnrbm9k1g6j4u</sha1>
    </revision>
    <revision>
      <id>36816</id>
      <parentid>36815</parentid>
      <timestamp>2018-09-14T12:06:57Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Support Schedule */</comment>
      <origin>36816</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9066" sha1="otyr3v4o6wi941xxyacfhckav95tiz1" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

{{Anchor|Release and Support Schedule}}
= Release Schedule =
Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
* After a new stable release of Whonix, Debian, Qubes or Qubes-Whonix is officially released and announced, the older release is only supported for one month due to limited human resources. &lt;ref&gt;This also relieves Whonix developers from needing to diagnose and support old-stable versions of Qubes/Debian/Whonix, which duplicates the maintenance burden.&lt;/ref&gt; The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news Whonix News forum]. [[Stay Tuned]]! This means users will need to upgrade the respective platform promptly if they wish to continue using it safely.
* One month after a new stable version of Debian is released, Whonix VMs will no longer be supported on any older version of Debian. This means that users who wish to continue using Whonix on Debian must always upgrade to the latest stable Debian version within one month of its release.
* One month after new stable versions of Whonix has been released, older versions of Whonix will no longer be supported. This means that users who wish to continue using Whonix on Debian must always upgrade to the latest stable Whonix version within one month of their release.

=== Debian based and other Hosts ===
Similar to [[#Debian Hosts]].

=== Windows Hosts ===
Mostly undefined. Similar to [[#Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix Qubes-Whonix version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and Whonix TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, Whonix TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of Whonix TemplateVMs are released, older versions of Whonix TemplateVMs will no longer be supported. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Whonix TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|documentation]] explaining how to use Whonix safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>otyr3v4o6wi941xxyacfhckav95tiz1</sha1>
    </revision>
    <revision>
      <id>37256</id>
      <parentid>36816</parentid>
      <timestamp>2018-09-30T06:24:58Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>Add link to manual version check, since this issue has come up recently</comment>
      <origin>37256</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9203" sha1="ciud456k1v997auci2lzwl0owjxhqs8" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the Whonix version at any time by following [[FAQ#How_do_I_Check_the_Current_Whonix_Version.3F|these steps]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
* After a new stable release of Whonix, Debian, Qubes or Qubes-Whonix is officially released and announced, the older release is only supported for one month due to limited human resources. &lt;ref&gt;This also relieves Whonix developers from needing to diagnose and support old-stable versions of Qubes/Debian/Whonix, which duplicates the maintenance burden.&lt;/ref&gt; The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news Whonix News forum]. [[Stay Tuned]]! This means users will need to upgrade the respective platform promptly if they wish to continue using it safely.
* One month after a new stable version of Debian is released, Whonix VMs will no longer be supported on any older version of Debian. This means that users who wish to continue using Whonix on Debian must always upgrade to the latest stable Debian version within one month of its release.
* One month after new stable versions of Whonix has been released, older versions of Whonix will no longer be supported. This means that users who wish to continue using Whonix on Debian must always upgrade to the latest stable Whonix version within one month of their release.

=== Debian based and other Hosts ===
Similar to [[#Debian Hosts]].

=== Windows Hosts ===
Mostly undefined. Similar to [[#Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix Qubes-Whonix version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and Whonix TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, Whonix TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of Whonix TemplateVMs are released, older versions of Whonix TemplateVMs will no longer be supported. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Whonix TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|documentation]] explaining how to use Whonix safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>ciud456k1v997auci2lzwl0owjxhqs8</sha1>
    </revision>
    <revision>
      <id>37257</id>
      <parentid>37256</parentid>
      <timestamp>2018-09-30T06:26:31Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>/* Whonix Version */</comment>
      <origin>37257</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9201" sha1="pt7lq366ial08lzvsgip90kdv7qmnez" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the Whonix version at any time by following [[FAQ#How_do_I_Check_the_Current_Whonix_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
* After a new stable release of Whonix, Debian, Qubes or Qubes-Whonix is officially released and announced, the older release is only supported for one month due to limited human resources. &lt;ref&gt;This also relieves Whonix developers from needing to diagnose and support old-stable versions of Qubes/Debian/Whonix, which duplicates the maintenance burden.&lt;/ref&gt; The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news Whonix News forum]. [[Stay Tuned]]! This means users will need to upgrade the respective platform promptly if they wish to continue using it safely.
* One month after a new stable version of Debian is released, Whonix VMs will no longer be supported on any older version of Debian. This means that users who wish to continue using Whonix on Debian must always upgrade to the latest stable Debian version within one month of its release.
* One month after new stable versions of Whonix has been released, older versions of Whonix will no longer be supported. This means that users who wish to continue using Whonix on Debian must always upgrade to the latest stable Whonix version within one month of their release.

=== Debian based and other Hosts ===
Similar to [[#Debian Hosts]].

=== Windows Hosts ===
Mostly undefined. Similar to [[#Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix Qubes-Whonix version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and Whonix TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, Whonix TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of Whonix TemplateVMs are released, older versions of Whonix TemplateVMs will no longer be supported. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Whonix TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|documentation]] explaining how to use Whonix safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>pt7lq366ial08lzvsgip90kdv7qmnez</sha1>
    </revision>
    <revision>
      <id>37258</id>
      <parentid>37257</parentid>
      <timestamp>2018-09-30T06:29:07Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>Nits</comment>
      <origin>37258</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9184" sha1="2pawppr9o6llfgxto9bdwpu8ycug26q" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the Whonix version at any time by following [[FAQ#How_do_I_Check_the_Current_Whonix_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
* After a new stable release of Whonix, Debian, Qubes or Qubes-Whonix is officially released and announced, the older release is only supported for one month due to limited human resources. &lt;ref&gt;This also relieves Whonix developers from needing to diagnose and support old-stable versions of Qubes/Debian/Whonix, which duplicates the maintenance burden.&lt;/ref&gt; The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news Whonix News forum]. [[Stay Tuned]]! This means users will need to upgrade the respective platform promptly if they wish to continue using it safely.
* One month after a new stable version of Debian is released, Whonix VMs will no longer be supported on any older version of Debian. This means that users who wish to continue using Whonix on Debian must always upgrade to the latest stable Debian version within one month of its release.
* One month after new stable versions of Whonix are released, older versions will no longer be supported. This means that users who wish to continue using Whonix on Debian must always upgrade to the latest stable Whonix version within one month of its release.

=== Debian based and other Hosts ===
Similar to [[#Debian Hosts]].

=== Windows Hosts ===
Mostly undefined. Similar to [[#Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix Qubes-Whonix version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and Whonix TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, Whonix TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of Whonix TemplateVMs are released, older versions of Whonix TemplateVMs will no longer be supported. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Whonix TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|documentation]] explaining how to use Whonix safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>2pawppr9o6llfgxto9bdwpu8ycug26q</sha1>
    </revision>
    <revision>
      <id>37259</id>
      <parentid>37258</parentid>
      <timestamp>2018-09-30T06:30:04Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>Nit</comment>
      <origin>37259</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9193" sha1="nw6fcol2ofgdv3ksi4c6w85epalykar" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the Whonix version at any time by following [[FAQ#How_do_I_Check_the_Current_Whonix_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
* After a new stable release of Whonix, Debian, Qubes or Qubes-Whonix is officially released and announced, the older release is only supported for one month due to limited human resources. &lt;ref&gt;This also relieves Whonix developers from needing to diagnose and support old-stable versions of Qubes/Debian/Whonix, which duplicates the maintenance burden.&lt;/ref&gt; The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news Whonix News forum]. [[Stay Tuned]]! This means users will need to upgrade the respective platform promptly if they wish to continue using it safely.
* One month after a new stable version of Debian is released, Whonix VMs will no longer be supported on any older version of Debian. This means that users who wish to continue using Whonix on Debian must always upgrade to the latest stable Debian version within one month of its release.
* One month after new stable versions of Whonix are released, older versions will no longer be supported. This means that users who wish to continue using Whonix on Debian must always upgrade to the latest stable Whonix version within one month of its release.

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
Mostly undefined. Similar to [[#Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix Qubes-Whonix version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and Whonix TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, Whonix TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of Whonix TemplateVMs are released, older versions of Whonix TemplateVMs will no longer be supported. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Whonix TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|documentation]] explaining how to use Whonix safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>nw6fcol2ofgdv3ksi4c6w85epalykar</sha1>
    </revision>
    <revision>
      <id>37260</id>
      <parentid>37259</parentid>
      <timestamp>2018-09-30T06:32:22Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>Nit</comment>
      <origin>37260</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9247" sha1="ix88kvu4k56mja5rw5h2vkinjdn2dtf" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the Whonix version at any time by following [[FAQ#How_do_I_Check_the_Current_Whonix_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
* After a new stable release of Whonix, Debian, Qubes or Qubes-Whonix is officially released and announced, the older release is only supported for one month due to limited human resources. &lt;ref&gt;This also relieves Whonix developers from needing to diagnose and support old-stable versions of Qubes/Debian/Whonix, which duplicates the maintenance burden.&lt;/ref&gt; The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news Whonix News forum]. [[Stay Tuned]]! This means users will need to upgrade the respective platform promptly if they wish to continue using it safely.
* One month after a new stable version of Debian is released, Whonix VMs will no longer be supported on any older version of Debian. This means that users who wish to continue using Whonix on Debian must always upgrade to the latest stable Debian version within one month of its release.
* One month after new stable versions of Whonix are released, older versions will no longer be supported. This means that users who wish to continue using Whonix on Debian must always upgrade to the latest stable Whonix version within one month of its release.

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix Qubes-Whonix version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and Whonix TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, Whonix TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of Whonix TemplateVMs are released, older versions of Whonix TemplateVMs will no longer be supported. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Whonix TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|documentation]] explaining how to use Whonix safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>ix88kvu4k56mja5rw5h2vkinjdn2dtf</sha1>
    </revision>
    <revision>
      <id>37261</id>
      <parentid>37260</parentid>
      <timestamp>2018-09-30T06:32:41Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>/* Windows Hosts */</comment>
      <origin>37261</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9251" sha1="2bc7aosshwlsr5yzz4levu1as7ltpkh" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the Whonix version at any time by following [[FAQ#How_do_I_Check_the_Current_Whonix_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
* After a new stable release of Whonix, Debian, Qubes or Qubes-Whonix is officially released and announced, the older release is only supported for one month due to limited human resources. &lt;ref&gt;This also relieves Whonix developers from needing to diagnose and support old-stable versions of Qubes/Debian/Whonix, which duplicates the maintenance burden.&lt;/ref&gt; The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news Whonix News forum]. [[Stay Tuned]]! This means users will need to upgrade the respective platform promptly if they wish to continue using it safely.
* One month after a new stable version of Debian is released, Whonix VMs will no longer be supported on any older version of Debian. This means that users who wish to continue using Whonix on Debian must always upgrade to the latest stable Debian version within one month of its release.
* One month after new stable versions of Whonix are released, older versions will no longer be supported. This means that users who wish to continue using Whonix on Debian must always upgrade to the latest stable Whonix version within one month of its release.

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix Qubes-Whonix version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and Whonix TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, Whonix TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of Whonix TemplateVMs are released, older versions of Whonix TemplateVMs will no longer be supported. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Whonix TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|documentation]] explaining how to use Whonix safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>2bc7aosshwlsr5yzz4levu1as7ltpkh</sha1>
    </revision>
    <revision>
      <id>37754</id>
      <parentid>37261</parentid>
      <timestamp>2018-10-03T09:29:15Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>Nits. Re-organize instead of bullet points. Rephrase/simplify. Why do we repeat Debian and Whonix info twice? You can delete bottom 2 sections?</comment>
      <origin>37754</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9166" sha1="d6z44n2ntchn3raqcspwtpljmqjnu3p" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the Whonix version at any time by following [[FAQ#How_do_I_Check_the_Current_Whonix_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===

'''New Whonix, Debian, Qubes or Qubes-Whonix Release'''

After a new stable release is officially released and announced, the older release is only supported for &lt;u&gt;one month&lt;/u&gt; due to limited human resources. &lt;ref&gt;This also relieves Whonix developers from needing to diagnose and support old-stable versions of Qubes/Debian/Whonix, which duplicates the maintenance burden.&lt;/ref&gt; 

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news Whonix News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe.

'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of Debian is released, Whonix VMs will no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly in order to use Whonix safely.

'''New Whonix Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of Whonix is released, older versions will no longer be supported. All users need to upgrade the Whonix platform promptly in order to remain safe.

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix Qubes-Whonix version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and Whonix TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, Whonix TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of Whonix TemplateVMs are released, older versions of Whonix TemplateVMs will no longer be supported. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Whonix TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|documentation]] explaining how to use Whonix safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>d6z44n2ntchn3raqcspwtpljmqjnu3p</sha1>
    </revision>
    <revision>
      <id>37981</id>
      <parentid>37754</parentid>
      <timestamp>2018-10-06T10:05:37Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Debian Hosts */</comment>
      <origin>37981</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9180" sha1="nt6en0x6ubp67etumg49ahsjg4liksd" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the Whonix version at any time by following [[FAQ#How_do_I_Check_the_Current_Whonix_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===

'''New Whonix, Debian, Qubes or Qubes-Whonix Release'''

After a new stable release is officially released and announced, the older release is only supported for &lt;u&gt;one month&lt;/u&gt; due to limited human resources. &lt;ref&gt;This also relieves Whonix developers from needing to diagnose and support old-stable versions of Qubes/Debian/Whonix, which duplicates the maintenance burden.&lt;/ref&gt; 

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news Whonix News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe.

'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, Whonix VMs will no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly in order to use Whonix safely.

'''New Whonix Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the Whonix platform promptly in order to remain safe.

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix Qubes-Whonix version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and Whonix TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, Whonix TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of Whonix TemplateVMs are released, older versions of Whonix TemplateVMs will no longer be supported. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Whonix TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|documentation]] explaining how to use Whonix safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>nt6en0x6ubp67etumg49ahsjg4liksd</sha1>
    </revision>
    <revision>
      <id>37982</id>
      <parentid>37981</parentid>
      <timestamp>2018-10-06T10:06:26Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Debian Hosts */</comment>
      <origin>37982</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9201" sha1="k11rytbxokjwxuqrg8ih0rjj7mq3oj8" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the Whonix version at any time by following [[FAQ#How_do_I_Check_the_Current_Whonix_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===

'''New Whonix, Debian, Qubes or Qubes-Whonix Release'''

After a new stable release is officially released and announced, the older release is only supported for &lt;u&gt;one month&lt;/u&gt; due to limited human resources. &lt;ref&gt;This also relieves Whonix developers from needing to diagnose and support old-stable versions of Qubes/Debian/Whonix, which duplicates the maintenance burden.&lt;/ref&gt; 

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news Whonix News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe.

'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, Whonix VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after deprecation notice order to use Whonix safely.

'''New Whonix Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the Whonix platform promptly in order to remain safe.

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix Qubes-Whonix version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and Whonix TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, Whonix TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of Whonix TemplateVMs are released, older versions of Whonix TemplateVMs will no longer be supported. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Whonix TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|documentation]] explaining how to use Whonix safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>k11rytbxokjwxuqrg8ih0rjj7mq3oj8</sha1>
    </revision>
    <revision>
      <id>37983</id>
      <parentid>37982</parentid>
      <timestamp>2018-10-06T10:10:15Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>Nit</comment>
      <origin>37983</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9208" sha1="fklhk8mxapir12olj7zc5h547rdrh2c" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the Whonix version at any time by following [[FAQ#How_do_I_Check_the_Current_Whonix_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===

'''New Whonix, Debian, Qubes or Qubes-Whonix Release'''

After a new stable release is officially released and announced, the older release is only supported for &lt;u&gt;one month&lt;/u&gt; due to limited human resources. &lt;ref&gt;This also relieves Whonix developers from needing to diagnose and support old-stable versions of Qubes/Debian/Whonix, which duplicates the maintenance burden.&lt;/ref&gt; 

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news Whonix News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe.

'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, Whonix VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use Whonix safely.

'''New Whonix Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the Whonix platform promptly in order to remain safe.

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix Qubes-Whonix version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and Whonix TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, Whonix TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of Whonix TemplateVMs are released, older versions of Whonix TemplateVMs will no longer be supported. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Whonix TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|documentation]] explaining how to use Whonix safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>fklhk8mxapir12olj7zc5h547rdrh2c</sha1>
    </revision>
    <revision>
      <id>37984</id>
      <parentid>37983</parentid>
      <timestamp>2018-10-06T10:11:22Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>/* Next Steps */</comment>
      <origin>37984</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9208" sha1="nq64ydd03yx8p581awkgr95h0ympvbu" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the Whonix version at any time by following [[FAQ#How_do_I_Check_the_Current_Whonix_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===

'''New Whonix, Debian, Qubes or Qubes-Whonix Release'''

After a new stable release is officially released and announced, the older release is only supported for &lt;u&gt;one month&lt;/u&gt; due to limited human resources. &lt;ref&gt;This also relieves Whonix developers from needing to diagnose and support old-stable versions of Qubes/Debian/Whonix, which duplicates the maintenance burden.&lt;/ref&gt; 

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news Whonix News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe.

'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, Whonix VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use Whonix safely.

'''New Whonix Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the Whonix platform promptly in order to remain safe.

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix Qubes-Whonix version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and Whonix TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, Whonix TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of Whonix TemplateVMs are released, older versions of Whonix TemplateVMs will no longer be supported. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Whonix TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use Whonix safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>nq64ydd03yx8p581awkgr95h0ympvbu</sha1>
    </revision>
    <revision>
      <id>37985</id>
      <parentid>37984</parentid>
      <timestamp>2018-10-06T10:11:50Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Debian Hosts */</comment>
      <origin>37985</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9021" sha1="g2v6f2y0q9a7wz3az4ii8er87gfj74z" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the Whonix version at any time by following [[FAQ#How_do_I_Check_the_Current_Whonix_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, Whonix VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use Whonix safely.

'''New Whonix Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the Whonix platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news Whonix News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves Whonix developers from needing to diagnose and support old-stable versions of Qubes/Debian/Whonix, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix Qubes-Whonix version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and Whonix TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, Whonix TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of Whonix TemplateVMs are released, older versions of Whonix TemplateVMs will no longer be supported. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Whonix TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use Whonix safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>g2v6f2y0q9a7wz3az4ii8er87gfj74z</sha1>
    </revision>
    <revision>
      <id>38199</id>
      <parentid>37985</parentid>
      <timestamp>2018-10-13T01:40:54Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>Fix title to match ToC</comment>
      <origin>38199</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9055" sha1="na6sdg40j582vqv0kadd5ykoshxkogn" xml:space="preserve">

&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{DISPLAYTITLE:Design and Goals}}
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the Whonix version at any time by following [[FAQ#How_do_I_Check_the_Current_Whonix_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, Whonix VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use Whonix safely.

'''New Whonix Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the Whonix platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news Whonix News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves Whonix developers from needing to diagnose and support old-stable versions of Qubes/Debian/Whonix, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix Qubes-Whonix version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and Whonix TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, Whonix TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of Whonix TemplateVMs are released, older versions of Whonix TemplateVMs will no longer be supported. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Whonix TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use Whonix safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>na6sdg40j582vqv0kadd5ykoshxkogn</sha1>
    </revision>
    <revision>
      <id>38784</id>
      <parentid>38199</parentid>
      <timestamp>2018-10-27T09:02:00Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>whitespace</comment>
      <origin>38784</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9053" sha1="maf27i6dmrn1x2us2ok4dikfs0o6k5s" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{DISPLAYTITLE:Design and Goals}}
{{#seo:
|description=Whoniy Summary, what who is, Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic routing via the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the Whonix version at any time by following [[FAQ#How_do_I_Check_the_Current_Whonix_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, Whonix VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use Whonix safely.

'''New Whonix Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the Whonix platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news Whonix News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves Whonix developers from needing to diagnose and support old-stable versions of Qubes/Debian/Whonix, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix Qubes-Whonix version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and Whonix TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, Whonix TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of Whonix TemplateVMs are released, older versions of Whonix TemplateVMs will no longer be supported. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Whonix TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use Whonix safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>maf27i6dmrn1x2us2ok4dikfs0o6k5s</sha1>
    </revision>
    <revision>
      <id>39456</id>
      <parentid>38784</parentid>
      <timestamp>2018-11-16T02:22:21Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>Fix typos. Simplify phasing.</comment>
      <origin>39456</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9047" sha1="0s7nmzfgqhgkcugcd9jhjo0f9zab7y3" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{DISPLAYTITLE:Design and Goals}}
{{#seo:
|description=Whoniy Summary: Whonix is; Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the Whonix version at any time by following [[FAQ#How_do_I_Check_the_Current_Whonix_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, Whonix VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use Whonix safely.

'''New Whonix Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the Whonix platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news Whonix News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves Whonix developers from needing to diagnose and support old-stable versions of Qubes/Debian/Whonix, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix Qubes-Whonix version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and Whonix TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, Whonix TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of Whonix TemplateVMs are released, older versions of Whonix TemplateVMs will no longer be supported. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Whonix TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use Whonix safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>0s7nmzfgqhgkcugcd9jhjo0f9zab7y3</sha1>
    </revision>
    <revision>
      <id>39457</id>
      <parentid>39456</parentid>
      <timestamp>2018-11-16T06:09:39Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>39457</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9047" sha1="l004od5rdw0rtszca20mntcmv29ca5i" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{DISPLAYTITLE:Design and Goals}}
{{#seo:
|description=Whonix Summary: Whonix is; Anonymity online through Tor, Security by Isolation, Based on Debian
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the Whonix version at any time by following [[FAQ#How_do_I_Check_the_Current_Whonix_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, Whonix VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use Whonix safely.

'''New Whonix Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the Whonix platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news Whonix News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves Whonix developers from needing to diagnose and support old-stable versions of Qubes/Debian/Whonix, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix Qubes-Whonix version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and Whonix TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, Whonix TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of Whonix TemplateVMs are released, older versions of Whonix TemplateVMs will no longer be supported. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Whonix TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use Whonix safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>l004od5rdw0rtszca20mntcmv29ca5i</sha1>
    </revision>
    <revision>
      <id>39674</id>
      <parentid>39457</parentid>
      <timestamp>2018-11-20T11:48:46Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>39674</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9037" sha1="cqnjxvj6wt7sxkla7hfzw2j9ms3acag" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{DISPLAYTITLE:Design and Goals}}
{{#seo:
|description=Whonix Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Free_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the Whonix version at any time by following [[FAQ#How_do_I_Check_the_Current_Whonix_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, Whonix VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use Whonix safely.

'''New Whonix Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the Whonix platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news Whonix News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves Whonix developers from needing to diagnose and support old-stable versions of Qubes/Debian/Whonix, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix Qubes-Whonix version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and Whonix TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, Whonix TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of Whonix TemplateVMs are released, older versions of Whonix TemplateVMs will no longer be supported. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Whonix TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use Whonix safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>cqnjxvj6wt7sxkla7hfzw2j9ms3acag</sha1>
    </revision>
    <revision>
      <id>41642</id>
      <parentid>39674</parentid>
      <timestamp>2019-03-16T06:43:04Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "Why_Whonix_is_Free_Software" to "Why_Whonix_is_Freedom_Software"</comment>
      <origin>41642</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9040" sha1="097398e4k2t92s2kb2b92qvbtke6l4j" xml:space="preserve">&lt;!--
Copyright:

   Whonix About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   Whonix About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in Whonix virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{DISPLAYTITLE:Design and Goals}}
{{#seo:
|description=Whonix Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting Whonix is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred Whonix configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Freedom_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each Whonix release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| Whonix &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the Whonix version at any time by following [[FAQ#How_do_I_Check_the_Current_Whonix_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that Whonix does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ Whonix phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, Whonix VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use Whonix safely.

'''New Whonix Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the Whonix platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news Whonix News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves Whonix developers from needing to diagnose and support old-stable versions of Qubes/Debian/Whonix, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix Qubes-Whonix version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and Whonix TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, Whonix TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of Whonix TemplateVMs are released, older versions of Whonix TemplateVMs will no longer be supported. This means that users who wish to continue using Whonix TemplateVMs on Qubes must always upgrade to the latest stable Whonix TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about Whonix is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of Whonix and Tor.
* Further information about Whonix [[Features]].
* The implied [[Trust]] placed in Whonix when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the Whonix specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use Whonix safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what Whonix is" chapter of the Whonix About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>097398e4k2t92s2kb2b92qvbtke6l4j</sha1>
    </revision>
    <revision>
      <id>43035</id>
      <parentid>41642</parentid>
      <timestamp>2019-04-22T11:21:14Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - " Whonix " to "{{project name}}"</comment>
      <origin>43035</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9320" sha1="g0bs8wvvji1x1ryw8sr4s3n1d5qe7n7" xml:space="preserve">&lt;!--
Copyright:

  {{project name}}About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
  {{project name}}About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in{{project name}}virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{DISPLAYTITLE:Design and Goals}}
{{#seo:
|description=Whonix Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting{{project name}}is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred{{project name}}configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Freedom_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

={{project name}}Version =
Each{{project name}}release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
|{{project name}}&lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the{{project name}}version at any time by following [[FAQ#How_do_I_Check_the_Current_Whonix_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that{{project name}}does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/{{project name}}phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released,{{project name}}VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use{{project name}}safely.

'''New{{project name}}Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the{{project name}}platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news{{project name}}News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves{{project name}}developers from needing to diagnose and support old-stable versions of Qubes/Debian/Whonix, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix Qubes-Whonix version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and{{project name}}TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released,{{project name}}TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using{{project name}}TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of{{project name}}TemplateVMs are released, older versions of{{project name}}TemplateVMs will no longer be supported. This means that users who wish to continue using{{project name}}TemplateVMs on Qubes must always upgrade to the latest stable{{project name}}TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

=={{project name}}is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

=={{project name}}Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

=={{project name}}is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about{{project name}}is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of{{project name}}and Tor.
* Further information about{{project name}}[[Features]].
* The implied [[Trust]] placed in{{project name}}when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the{{project name}}specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use{{project name}}safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what{{project name}}is" chapter of the{{project name}}About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>g0bs8wvvji1x1ryw8sr4s3n1d5qe7n7</sha1>
    </revision>
    <revision>
      <id>43227</id>
      <parentid>43035</parentid>
      <timestamp>2019-04-22T11:23:08Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "{{project name}}" to " {{project name}} "</comment>
      <origin>43227</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9390" sha1="f9pkoio7f8hqyjs9rigj06cikz50qrg" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{DISPLAYTITLE:Design and Goals}}
{{#seo:
|description=Whonix Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Freedom_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= {{project name}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_Whonix_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[Whonix_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/Whonix, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix Qubes-Whonix version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== {{project name}} is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== {{project name}} Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== {{project name}} is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>f9pkoio7f8hqyjs9rigj06cikz50qrg</sha1>
    </revision>
    <revision>
      <id>43465</id>
      <parentid>43227</parentid>
      <timestamp>2019-04-22T11:36:36Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "[[Whonix" to "[[{{project name short}}"</comment>
      <origin>43465</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9406" sha1="1em7dkfx605xrn7bp91khb02thpupmf" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{DISPLAYTITLE:Design and Goals}}
{{#seo:
|description=Whonix Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[Qubes-Whonix]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Freedom_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[Qubes-Whonix]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= {{project name}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_Whonix_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/Whonix, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix Qubes-Whonix version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== {{project name}} is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== {{project name}} Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== {{project name}} is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>1em7dkfx605xrn7bp91khb02thpupmf</sha1>
    </revision>
    <revision>
      <id>43575</id>
      <parentid>43465</parentid>
      <timestamp>2019-04-22T11:48:30Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "[[Qubes-Whonix]]" to "[[{{q project name short}}|{{q project name}}]]"</comment>
      <origin>43575</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9468" sha1="kyxam1yq1ayl50m5tkczgspwzs49433" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{DISPLAYTITLE:Design and Goals}}
{{#seo:
|description=Whonix Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Freedom_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= {{project name}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_Whonix_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/Whonix, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix Qubes-Whonix version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== {{project name}} is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== {{project name}} Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== {{project name}} is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>kyxam1yq1ayl50m5tkczgspwzs49433</sha1>
    </revision>
    <revision>
      <id>43758</id>
      <parentid>43575</parentid>
      <timestamp>2019-04-22T12:06:40Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "Whonix," to "{{project_name}},"</comment>
      <origin>43758</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9478" sha1="98xdfcj2p2roru0wez627pt60pi63ma" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{DISPLAYTITLE:Design and Goals}}
{{#seo:
|description=Whonix Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Freedom_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= {{project name}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_Whonix_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix Qubes-Whonix version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== {{project name}} is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== {{project name}} Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== {{project name}} is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>98xdfcj2p2roru0wez627pt60pi63ma</sha1>
    </revision>
    <revision>
      <id>43980</id>
      <parentid>43758</parentid>
      <timestamp>2019-04-22T12:43:05Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "Qubes-Whonix " to "[[{{q_project_name_short}}|{{q_project_name}}]] "</comment>
      <origin>43980</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9513" sha1="qmbqog1repqyn1s3lo5sxw2y9b4tpwq" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{DISPLAYTITLE:Design and Goals}}
{{#seo:
|description=Whonix Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- Whonix-Gateway and Whonix-Workstation -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Freedom_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= {{project name}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_Whonix_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== {{project name}} is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== {{project name}} Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== {{project name}} is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>qmbqog1repqyn1s3lo5sxw2y9b4tpwq</sha1>
    </revision>
    <revision>
      <id>44187</id>
      <parentid>43980</parentid>
      <timestamp>2019-04-22T13:13:34Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "Whonix-Gateway and Whonix-Workstation" to "{{gateway_product_name}} and {{workstation_product_name}}"</comment>
      <origin>44187</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9533" sha1="rrjicktgide39stcapexpz04km0s3hj" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{DISPLAYTITLE:Design and Goals}}
{{#seo:
|description=Whonix Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- {{gateway_product_name}} and {{workstation_product_name}} -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Freedom_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: Whonix-Workstation for work activities and Whonix-Gateway to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= {{project name}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_Whonix_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== {{project name}} is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== {{project name}} Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== {{project name}} is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>rrjicktgide39stcapexpz04km0s3hj</sha1>
    </revision>
    <revision>
      <id>44305</id>
      <parentid>44187</parentid>
      <timestamp>2019-04-22T13:26:53Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "Whonix-Workstation " to "{{workstation_product_name}} "</comment>
      <origin>44305</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9543" sha1="gqx44y0p95m5fqw0efv0zaqu2ydzwbp" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{DISPLAYTITLE:Design and Goals}}
{{#seo:
|description=Whonix Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- {{gateway_product_name}} and {{workstation_product_name}} -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Freedom_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: {{workstation_product_name}} for work activities and Whonix-Gateway to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= {{project name}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_Whonix_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== {{project name}} is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== {{project name}} Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== {{project name}} is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>gqx44y0p95m5fqw0efv0zaqu2ydzwbp</sha1>
    </revision>
    <revision>
      <id>44613</id>
      <parentid>44305</parentid>
      <timestamp>2019-04-22T13:38:16Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - " Whonix-Gateway " to " {{gateway_product_name}} "</comment>
      <origin>44613</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9553" sha1="od0zblnmvqry7bpjm4l864hpkcibfsz" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{DISPLAYTITLE:Design and Goals}}
{{#seo:
|description=Whonix Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- {{gateway_product_name}} and {{workstation_product_name}} -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Freedom_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= {{project name}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_Whonix_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== {{project name}} is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== {{project name}} Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== {{project name}} is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>od0zblnmvqry7bpjm4l864hpkcibfsz</sha1>
    </revision>
    <revision>
      <id>45345</id>
      <parentid>44613</parentid>
      <timestamp>2019-04-25T01:02:14Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>lose "TM" in titles (looks like shit)</comment>
      <origin>45345</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9543" sha1="asp8sscize6o60dcq3j1qofyvp9t52o" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{DISPLAYTITLE:Design and Goals}}
{{#seo:
|description=Whonix Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- {{gateway_product_name}} and {{workstation_product_name}} -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Freedom_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_Whonix_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== {{project name}} is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== {{project name}} Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== {{project name}} is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>asp8sscize6o60dcq3j1qofyvp9t52o</sha1>
    </revision>
    <revision>
      <id>45346</id>
      <parentid>45345</parentid>
      <timestamp>2019-04-25T01:03:14Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>ditto</comment>
      <origin>45346</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9513" sha1="mxkyndz0i6nkny81b5jh6u0epkmwi3q" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{DISPLAYTITLE:Design and Goals}}
{{#seo:
|description=Whonix Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- {{gateway_product_name}} and {{workstation_product_name}} -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Freedom_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= Whonix Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_Whonix_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== Whonix is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== Whonix Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== Whonix is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>mxkyndz0i6nkny81b5jh6u0epkmwi3q</sha1>
    </revision>
    <revision>
      <id>45364</id>
      <parentid>45346</parentid>
      <timestamp>2019-04-25T10:38:54Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>Rejected the last 2 text changes (by [[Special:Contributions/127.0.0.1|127.0.0.1]]) and restored revision 44613 by Patrick</comment>
      <origin>45364</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9553" sha1="od0zblnmvqry7bpjm4l864hpkcibfsz" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/Whonix/Whonix/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{DISPLAYTITLE:Design and Goals}}
{{#seo:
|description=Whonix Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- {{gateway_product_name}} and {{workstation_product_name}} -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Freedom_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= {{project name}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_Whonix_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== {{project name}} is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== {{project name}} Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== {{project name}} is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>od0zblnmvqry7bpjm4l864hpkcibfsz</sha1>
    </revision>
    <revision>
      <id>45371</id>
      <parentid>45364</parentid>
      <timestamp>2019-04-25T11:31:15Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "/Whonix" to "/{{project_name_short}}"</comment>
      <origin>45371</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9585" sha1="pjxmsljn05rtyp7sv79t8af3e7py927" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{DISPLAYTITLE:Design and Goals}}
{{#seo:
|description=Whonix Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
Whonix aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

Whonix is a complete operating system. It consists of two virtual machines -- {{gateway_product_name}} and {{workstation_product_name}} -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

Whonix is [[Why_Whonix_is_Freedom_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

Whonix is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''Whonix Operating System Design''

[[File:Whonix concept refined.jpg]]

= Online Anonymity via Tor =

Whonix relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= {{project name}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;Whonix version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_Whonix_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "Whonix 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
Whonix is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== {{project name}} is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== {{project name}} Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== {{project name}} is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>pjxmsljn05rtyp7sv79t8af3e7py927</sha1>
    </revision>
    <revision>
      <id>45714</id>
      <parentid>45371</parentid>
      <timestamp>2019-04-25T12:07:30Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "Whonix " to "{{project_name}} "</comment>
      <origin>45714</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9695" sha1="agzoaqgmj0v235tnzw24stdut0ept8k" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{DISPLAYTITLE:Design and Goals}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system. It consists of two virtual machines -- {{gateway_product_name}} and {{workstation_product_name}} -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_Whonix_is_Freedom_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''

[[File:{{project_name}} concept refined.jpg]]

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= {{project name}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_Whonix_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "{{project_name}} 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== {{project name}} is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== {{project name}} Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== {{project name}} is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>agzoaqgmj0v235tnzw24stdut0ept8k</sha1>
    </revision>
    <revision>
      <id>45992</id>
      <parentid>45714</parentid>
      <timestamp>2019-04-25T12:48:13Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "_Whonix_" to "_{{project_name_short}}_"</comment>
      <origin>45992</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9727" sha1="pt9lbwyepju9yxi3o4rrcuv97e7v4pd" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{DISPLAYTITLE:Design and Goals}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system. It consists of two virtual machines -- {{gateway_product_name}} and {{workstation_product_name}} -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''

[[File:{{project_name}} concept refined.jpg]]

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

= {{project name}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "{{project_name}} 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== {{project name}} is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== {{project name}} Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== {{project name}} is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>pt9lbwyepju9yxi3o4rrcuv97e7v4pd</sha1>
    </revision>
    <revision>
      <id>46380</id>
      <parentid>45992</parentid>
      <timestamp>2019-04-25T13:54:56Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* {{project name}} Version */</comment>
      <origin>46380</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9769" sha1="stw9ouglckjqtfku7o4gpealmpq5xd6" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{DISPLAYTITLE:Design and Goals}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system. It consists of two virtual machines -- {{gateway_product_name}} and {{workstation_product_name}} -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''

[[File:{{project_name}} concept refined.jpg]]

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "{{project_name}} 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== {{project name}} is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== {{project name}} Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== {{project name}} is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>stw9ouglckjqtfku7o4gpealmpq5xd6</sha1>
    </revision>
    <revision>
      <id>46721</id>
      <parentid>46380</parentid>
      <timestamp>2019-04-30T13:10:45Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "{{DISPLAYTITLE:" to "{{Title|title="</comment>
      <origin>46721</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9768" sha1="08q4cfzfg8r8ftr7zl92tb1tn2rx2p3" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system. It consists of two virtual machines -- {{gateway_product_name}} and {{workstation_product_name}} -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''

[[File:{{project_name}} concept refined.jpg]]

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "{{project_name}} 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== {{project name}} is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== {{project name}} Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== {{project name}} is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>08q4cfzfg8r8ftr7zl92tb1tn2rx2p3</sha1>
    </revision>
    <revision>
      <id>46881</id>
      <parentid>46721</parentid>
      <timestamp>2019-05-01T19:17:10Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Security by Isolation */</comment>
      <origin>46881</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9774" sha1="8wkgq8prno99kfr09dpc4heovxpnyr5" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system. It consists of two virtual machines -- {{gateway_product_name}} and {{workstation_product_name}} -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''

[[File:{{project_name_short}} concept refined.jpg]]

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "{{project_name}} 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== {{project name}} is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== {{project name}} Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== {{project name}} is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>8wkgq8prno99kfr09dpc4heovxpnyr5</sha1>
    </revision>
    <revision>
      <id>47241</id>
      <parentid>46881</parentid>
      <timestamp>2019-05-12T06:48:33Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>ditto</comment>
      <origin>47241</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9788" sha1="aiu39kno3ei7cqlbwuqqwqmcib5ut14" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system. It consists of two virtual machines -- {{gateway_product_name}} and {{workstation_product_name}} -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "{{project_name}} 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

== {{project name}} is ==

* A free and open operating system.
* An anti-censorship tool.
* The first step among many in hiding a user's identity.

== {{project name}} Helps to == 

* Disguise a user's IP address.
* Prevent ISP spying.
* Prevent websites from identifying the user.
* Prevent malware from identifying the user.
* Circumvent censorship.

== {{project name}} is not ==

* A one-click anonymization solution.

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>aiu39kno3ei7cqlbwuqqwqmcib5ut14</sha1>
    </revision>
    <revision>
      <id>47243</id>
      <parentid>47241</parentid>
      <timestamp>2019-05-12T07:03:14Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>3 small sections -&gt; 1 table</comment>
      <origin>47243</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="10019" sha1="7pnoe9ld5yxi6rm7jps0jdy8kg2l5pm" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system. It consists of two virtual machines -- {{gateway_product_name}} and {{workstation_product_name}} -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "{{project_name}} 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* A free and open operating system. &lt;br /&gt;
* An anti-censorship tool. &lt;br /&gt;
* The first step among many in hiding a user's identity.
|-
! scope="row"| {{project name}} Helps to
| 
* Disguise a user's IP address.&lt;br /&gt;
* Prevent ISP spying.&lt;br /&gt;
* Prevent websites from identifying the user.&lt;br /&gt;
* Prevent malware from identifying the user.&lt;br /&gt;
* Circumvent censorship.
|-
! scope="row"| {{project name}} is not
| * A one-click anonymization solution.
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>7pnoe9ld5yxi6rm7jps0jdy8kg2l5pm</sha1>
    </revision>
    <revision>
      <id>47568</id>
      <parentid>47243</parentid>
      <timestamp>2019-05-27T09:55:33Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>47568</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="10031" sha1="5x7pezfbo65wu3mvyxrs0xcizaxp9z2" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
{{comment_end}}
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system. It consists of two virtual machines -- {{gateway_product_name}} and {{workstation_product_name}} -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "{{project_name}} 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* A free and open operating system. &lt;br /&gt;
* An anti-censorship tool. &lt;br /&gt;
* The first step among many in hiding a user's identity.
|-
! scope="row"| {{project name}} Helps to
| 
* Disguise a user's IP address.&lt;br /&gt;
* Prevent ISP spying.&lt;br /&gt;
* Prevent websites from identifying the user.&lt;br /&gt;
* Prevent malware from identifying the user.&lt;br /&gt;
* Circumvent censorship.
|-
! scope="row"| {{project name}} is not
| * A one-click anonymization solution.
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>5x7pezfbo65wu3mvyxrs0xcizaxp9z2</sha1>
    </revision>
    <revision>
      <id>47570</id>
      <parentid>47568</parentid>
      <timestamp>2019-05-27T09:55:57Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>47570</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="10044" sha1="c3l606p82rke1l0y1r6ogo17h6qr8nv" xml:space="preserve">{{comment_start}}
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
{{comment_end}}
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system. It consists of two virtual machines -- {{gateway_product_name}} and {{workstation_product_name}} -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "{{project_name}} 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* A free and open operating system. &lt;br /&gt;
* An anti-censorship tool. &lt;br /&gt;
* The first step among many in hiding a user's identity.
|-
! scope="row"| {{project name}} Helps to
| 
* Disguise a user's IP address.&lt;br /&gt;
* Prevent ISP spying.&lt;br /&gt;
* Prevent websites from identifying the user.&lt;br /&gt;
* Prevent malware from identifying the user.&lt;br /&gt;
* Circumvent censorship.
|-
! scope="row"| {{project name}} is not
| * A one-click anonymization solution.
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>c3l606p82rke1l0y1r6ogo17h6qr8nv</sha1>
    </revision>
    <revision>
      <id>47573</id>
      <parentid>47570</parentid>
      <timestamp>2019-05-27T09:57:45Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>47573</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="10043" sha1="r0uztv6dws9efo8928kxfvt396rhv2k" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
{{comment_end}}
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
{{comment_end}}
{{Title|title=Design and Goals}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system. It consists of two virtual machines -- {{gateway_product_name}} and {{workstation_product_name}} -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "{{project_name}} 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* A free and open operating system. &lt;br /&gt;
* An anti-censorship tool. &lt;br /&gt;
* The first step among many in hiding a user's identity.
|-
! scope="row"| {{project name}} Helps to
| 
* Disguise a user's IP address.&lt;br /&gt;
* Prevent ISP spying.&lt;br /&gt;
* Prevent websites from identifying the user.&lt;br /&gt;
* Prevent malware from identifying the user.&lt;br /&gt;
* Circumvent censorship.
|-
! scope="row"| {{project name}} is not
| * A one-click anonymization solution.
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>r0uztv6dws9efo8928kxfvt396rhv2k</sha1>
    </revision>
    <revision>
      <id>47574</id>
      <parentid>47573</parentid>
      <timestamp>2019-05-27T09:58:42Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>47574</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="10019" sha1="7pnoe9ld5yxi6rm7jps0jdy8kg2l5pm" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system. It consists of two virtual machines -- {{gateway_product_name}} and {{workstation_product_name}} -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "{{project_name}} 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* A free and open operating system. &lt;br /&gt;
* An anti-censorship tool. &lt;br /&gt;
* The first step among many in hiding a user's identity.
|-
! scope="row"| {{project name}} Helps to
| 
* Disguise a user's IP address.&lt;br /&gt;
* Prevent ISP spying.&lt;br /&gt;
* Prevent websites from identifying the user.&lt;br /&gt;
* Prevent malware from identifying the user.&lt;br /&gt;
* Circumvent censorship.
|-
! scope="row"| {{project name}} is not
| * A one-click anonymization solution.
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>7pnoe9ld5yxi6rm7jps0jdy8kg2l5pm</sha1>
    </revision>
    <revision>
      <id>47887</id>
      <parentid>47574</parentid>
      <timestamp>2019-06-08T13:40:11Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>fix</comment>
      <origin>47887</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="10020" sha1="eokr7xar21c325nl5efpngdea8tpkcz" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system. It consists of two virtual machines -- {{gateway_product_name}} and {{workstation_product_name}} -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''9'' || [https://www.debian.org/releases/stretch/ stretch]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "{{project_name}} 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* A free and open operating system. &lt;br /&gt;
* An anti-censorship tool. &lt;br /&gt;
* The first step among many in hiding a user's identity.
|-
! scope="row"| {{project name}} Helps to
| 
* Disguise a user's IP address.&lt;br /&gt;
* Prevent ISP spying.&lt;br /&gt;
* Prevent websites from identifying the user.&lt;br /&gt;
* Prevent malware from identifying the user.&lt;br /&gt;
* Circumvent censorship.
|-
! scope="row"| {{project name}} is not
| 
* A one-click anonymization solution.
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>eokr7xar21c325nl5efpngdea8tpkcz</sha1>
    </revision>
    <revision>
      <id>48999</id>
      <parentid>47887</parentid>
      <timestamp>2019-07-01T10:34:08Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* {{project_name_short}} Version */</comment>
      <origin>48999</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="10019" sha1="3yqz4etmagnwgcg80o8dpri886512cu" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
{{Header}}
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system. It consists of two virtual machines -- {{gateway_product_name}} and {{workstation_product_name}} -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''10'' || [https://www.debian.org/releases/buster/ buster]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "{{project_name}} 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* A free and open operating system. &lt;br /&gt;
* An anti-censorship tool. &lt;br /&gt;
* The first step among many in hiding a user's identity.
|-
! scope="row"| {{project name}} Helps to
| 
* Disguise a user's IP address.&lt;br /&gt;
* Prevent ISP spying.&lt;br /&gt;
* Prevent websites from identifying the user.&lt;br /&gt;
* Prevent malware from identifying the user.&lt;br /&gt;
* Circumvent censorship.
|-
! scope="row"| {{project name}} is not
| 
* A one-click anonymization solution.
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>3yqz4etmagnwgcg80o8dpri886512cu</sha1>
    </revision>
    <revision>
      <id>51823</id>
      <parentid>48999</parentid>
      <timestamp>2019-10-31T14:41:19Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>51823</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="10019" sha1="4zku1s718p6607s5hxi1kzhtcxplr3l" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2018 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system. It consists of two virtual machines -- {{gateway_product_name}} and {{workstation_product_name}} -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''10'' || [https://www.debian.org/releases/buster/ buster]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "{{project_name}} 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* A free and open operating system. &lt;br /&gt;
* An anti-censorship tool. &lt;br /&gt;
* The first step among many in hiding a user's identity.
|-
! scope="row"| {{project name}} Helps to
| 
* Disguise a user's IP address.&lt;br /&gt;
* Prevent ISP spying.&lt;br /&gt;
* Prevent websites from identifying the user.&lt;br /&gt;
* Prevent malware from identifying the user.&lt;br /&gt;
* Circumvent censorship.
|-
! scope="row"| {{project name}} is not
| 
* A one-click anonymization solution.
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>4zku1s718p6607s5hxi1kzhtcxplr3l</sha1>
    </revision>
    <revision>
      <id>52299</id>
      <parentid>51823</parentid>
      <timestamp>2019-11-07T13:02:29Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "2012 - 2018 ENCRYPTED SUPPORT LP" to "2012 - 2019 ENCRYPTED SUPPORT LP"</comment>
      <origin>52299</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="10019" sha1="nwmzrt78drx5zs3cds1uwx53b0faxbo" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2019 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system. It consists of two virtual machines -- {{gateway_product_name}} and {{workstation_product_name}} -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Free Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''10'' || [https://www.debian.org/releases/buster/ buster]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "{{project_name}} 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* A free and open operating system. &lt;br /&gt;
* An anti-censorship tool. &lt;br /&gt;
* The first step among many in hiding a user's identity.
|-
! scope="row"| {{project name}} Helps to
| 
* Disguise a user's IP address.&lt;br /&gt;
* Prevent ISP spying.&lt;br /&gt;
* Prevent websites from identifying the user.&lt;br /&gt;
* Prevent malware from identifying the user.&lt;br /&gt;
* Circumvent censorship.
|-
! scope="row"| {{project name}} is not
| 
* A one-click anonymization solution.
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>nwmzrt78drx5zs3cds1uwx53b0faxbo</sha1>
    </revision>
    <revision>
      <id>54945</id>
      <parentid>52299</parentid>
      <timestamp>2020-03-03T17:31:25Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Introduction */</comment>
      <origin>54945</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="10022" sha1="ongjesaq4j795vzshyn07yukeqhlmsr" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2019 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system. It consists of two virtual machines -- {{gateway_product_name}} and {{workstation_product_name}} -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Freedom Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''10'' || [https://www.debian.org/releases/buster/ buster]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "{{project_name}} 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* A free and open operating system. &lt;br /&gt;
* An anti-censorship tool. &lt;br /&gt;
* The first step among many in hiding a user's identity.
|-
! scope="row"| {{project name}} Helps to
| 
* Disguise a user's IP address.&lt;br /&gt;
* Prevent ISP spying.&lt;br /&gt;
* Prevent websites from identifying the user.&lt;br /&gt;
* Prevent malware from identifying the user.&lt;br /&gt;
* Circumvent censorship.
|-
! scope="row"| {{project name}} is not
| 
* A one-click anonymization solution.
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>ongjesaq4j795vzshyn07yukeqhlmsr</sha1>
    </revision>
    <revision>
      <id>55408</id>
      <parentid>54945</parentid>
      <timestamp>2020-03-21T09:10:03Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Introduction */</comment>
      <origin>55408</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="10096" sha1="4hzlrio2uwhrsxfo64imbha66x67bwu" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2019 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Freedom Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''10'' || [https://www.debian.org/releases/buster/ buster]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "{{project_name}} 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* A free and open operating system. &lt;br /&gt;
* An anti-censorship tool. &lt;br /&gt;
* The first step among many in hiding a user's identity.
|-
! scope="row"| {{project name}} Helps to
| 
* Disguise a user's IP address.&lt;br /&gt;
* Prevent ISP spying.&lt;br /&gt;
* Prevent websites from identifying the user.&lt;br /&gt;
* Prevent malware from identifying the user.&lt;br /&gt;
* Circumvent censorship.
|-
! scope="row"| {{project name}} is not
| 
* A one-click anonymization solution.
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>4hzlrio2uwhrsxfo64imbha66x67bwu</sha1>
    </revision>
    <revision>
      <id>55413</id>
      <parentid>55408</parentid>
      <timestamp>2020-03-21T09:36:15Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>55413</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="10127" sha1="npgwgooshht1xrqlu1048cmr16yjet7" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2019 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Freedom Software]] and is based on Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''10'' || [https://www.debian.org/releases/buster/ buster]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "{{project_name}} 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* A free and open operating system. &lt;br /&gt;
* An anti-censorship tool. &lt;br /&gt;
* The first step among many in hiding a user's identity.
|-
! scope="row"| {{project name}} Helps to
| 
* Disguise a user's IP address.&lt;br /&gt;
* Prevent ISP spying.&lt;br /&gt;
* Prevent websites from identifying the user.&lt;br /&gt;
* Prevent malware from identifying the user.&lt;br /&gt;
* Circumvent censorship.
|-
! scope="row"| {{project name}} is not
| 
* A one-click anonymization solution.
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>npgwgooshht1xrqlu1048cmr16yjet7</sha1>
    </revision>
    <revision>
      <id>55418</id>
      <parentid>55413</parentid>
      <timestamp>2020-03-21T09:42:01Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Introduction */</comment>
      <origin>55418</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="10185" sha1="czl9v5f5b0pbwpflafgjbvesw4mjiqb" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2019 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''10'' || [https://www.debian.org/releases/buster/ buster]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "{{project_name}} 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* A free and open operating system. &lt;br /&gt;
* An anti-censorship tool. &lt;br /&gt;
* The first step among many in hiding a user's identity.
|-
! scope="row"| {{project name}} Helps to
| 
* Disguise a user's IP address.&lt;br /&gt;
* Prevent ISP spying.&lt;br /&gt;
* Prevent websites from identifying the user.&lt;br /&gt;
* Prevent malware from identifying the user.&lt;br /&gt;
* Circumvent censorship.
|-
! scope="row"| {{project name}} is not
| 
* A one-click anonymization solution.
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>czl9v5f5b0pbwpflafgjbvesw4mjiqb</sha1>
    </revision>
    <revision>
      <id>55419</id>
      <parentid>55418</parentid>
      <timestamp>2020-03-21T09:45:28Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Introduction */</comment>
      <origin>55419</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="10266" sha1="trmkq88p3q5c6l4nh24se3apranxvta" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2019 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''10'' || [https://www.debian.org/releases/buster/ buster]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "{{project_name}} 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* A free and open operating system. &lt;br /&gt;
* An anti-censorship tool. &lt;br /&gt;
* The first step among many in hiding a user's identity.
|-
! scope="row"| {{project name}} Helps to
| 
* Disguise a user's IP address.&lt;br /&gt;
* Prevent ISP spying.&lt;br /&gt;
* Prevent websites from identifying the user.&lt;br /&gt;
* Prevent malware from identifying the user.&lt;br /&gt;
* Circumvent censorship.
|-
! scope="row"| {{project name}} is not
| 
* A one-click anonymization solution.
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>trmkq88p3q5c6l4nh24se3apranxvta</sha1>
    </revision>
    <revision>
      <id>56596</id>
      <parentid>55419</parentid>
      <timestamp>2020-05-03T17:27:13Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "2012 - 2019 ENCRYPTED SUPPORT LP" to "2012 - 2020 ENCRYPTED SUPPORT LP"</comment>
      <origin>56596</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="10266" sha1="o2e06xrkxxg37ap16jrm52oudk4ehev" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2020 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''10'' || [https://www.debian.org/releases/buster/ buster]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "{{project_name}} 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} is an advanced feature in Qubes OS. Those who wish to use it must stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project name}} TemplateVMs are released, older versions of {{project name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project name}} TemplateVM versions within one month of their release.
We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* A free and open operating system. &lt;br /&gt;
* An anti-censorship tool. &lt;br /&gt;
* The first step among many in hiding a user's identity.
|-
! scope="row"| {{project name}} Helps to
| 
* Disguise a user's IP address.&lt;br /&gt;
* Prevent ISP spying.&lt;br /&gt;
* Prevent websites from identifying the user.&lt;br /&gt;
* Prevent malware from identifying the user.&lt;br /&gt;
* Circumvent censorship.
|-
! scope="row"| {{project name}} is not
| 
* A one-click anonymization solution.
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>o2e06xrkxxg37ap16jrm52oudk4ehev</sha1>
    </revision>
    <revision>
      <id>57815</id>
      <parentid>56596</parentid>
      <timestamp>2020-06-07T07:27:26Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>Qubes website quote changed slightly -&gt; update</comment>
      <origin>57815</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="10435" sha1="hl6kliuye81makvqlg5exy3owr88kdz" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2020 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''10'' || [https://www.debian.org/releases/buster/ buster]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "{{project_name}} 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} TemplateVMs are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} TemplateVMs in Qubes.

This policy requires {{project_name}} TemplateVM users to stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project_name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project_name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project_name}} TemplateVMs are released, older versions of {{project_name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project_name}} TemplateVM versions within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* A free and open operating system. &lt;br /&gt;
* An anti-censorship tool. &lt;br /&gt;
* The first step among many in hiding a user's identity.
|-
! scope="row"| {{project name}} Helps to
| 
* Disguise a user's IP address.&lt;br /&gt;
* Prevent ISP spying.&lt;br /&gt;
* Prevent websites from identifying the user.&lt;br /&gt;
* Prevent malware from identifying the user.&lt;br /&gt;
* Circumvent censorship.
|-
! scope="row"| {{project name}} is not
| 
* A one-click anonymization solution.
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>hl6kliuye81makvqlg5exy3owr88kdz</sha1>
    </revision>
    <revision>
      <id>58007</id>
      <parentid>57815</parentid>
      <timestamp>2020-06-19T09:33:53Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <origin>58007</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="10478" sha1="h982ytsh5sir6tdz5jeqx0j08sjqu2s" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2020 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''10'' || [https://www.debian.org/releases/buster/ buster]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [https://phabricator.whonix.org/maniphest/ {{project name}} phabricator manifest] &lt;ref&gt;For example, for the next release use the tag "{{project_name}} 15" and status "Open".&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} TemplateVMs are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} TemplateVMs in Qubes.

This policy requires {{project_name}} TemplateVM users to stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project_name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project_name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project_name}} TemplateVMs are released, older versions of {{project_name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project_name}} TemplateVM versions within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* A free and open operating system. &lt;br /&gt;
* An anti-censorship tool. &lt;br /&gt;
* The first step among many in hiding a user's identity.
|-
! scope="row"| {{project name}} Helps to
| 
* Disguise a user's IP address.&lt;br /&gt;
* Prevent ISP spying.&lt;br /&gt;
* Prevent websites from identifying the user.&lt;br /&gt;
* Prevent malware from identifying the user.&lt;br /&gt;
* Circumvent censorship.
|-
! scope="row"| {{project name}} is not
| 
* A one-click anonymization solution.
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>h982ytsh5sir6tdz5jeqx0j08sjqu2s</sha1>
    </revision>
    <revision>
      <id>58763</id>
      <parentid>58007</parentid>
      <timestamp>2020-07-21T10:33:23Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Release Schedule */</comment>
      <origin>58763</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="10445" sha1="8uw2h4exd1e5i8tz9dj031koqcoizxj" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2020 ENCRYPTED SUPPORT LP &lt;adrelanos@riseup.net&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''10'' || [https://www.debian.org/releases/buster/ buster]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 15" and status "Open".
&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} TemplateVMs are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} TemplateVMs in Qubes.

This policy requires {{project_name}} TemplateVM users to stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project_name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project_name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project_name}} TemplateVMs are released, older versions of {{project_name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project_name}} TemplateVM versions within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* A free and open operating system. &lt;br /&gt;
* An anti-censorship tool. &lt;br /&gt;
* The first step among many in hiding a user's identity.
|-
! scope="row"| {{project name}} Helps to
| 
* Disguise a user's IP address.&lt;br /&gt;
* Prevent ISP spying.&lt;br /&gt;
* Prevent websites from identifying the user.&lt;br /&gt;
* Prevent malware from identifying the user.&lt;br /&gt;
* Circumvent censorship.
|-
! scope="row"| {{project name}} is not
| 
* A one-click anonymization solution.
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>8uw2h4exd1e5i8tz9dj031koqcoizxj</sha1>
    </revision>
    <revision>
      <id>58810</id>
      <parentid>58763</parentid>
      <timestamp>2020-07-22T16:33:14Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "adrelanos@riseup.net" to "adrelanos@whonix.org"</comment>
      <origin>58810</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="10445" sha1="93w1uvesrmd5ltb35eutkvux4oezjt4" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2020 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''10'' || [https://www.debian.org/releases/buster/ buster]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 15" and status "Open".
&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[{{q_project_name_short}}|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} TemplateVMs are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} TemplateVMs in Qubes.

This policy requires {{project_name}} TemplateVM users to stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project_name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project_name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project_name}} TemplateVMs are released, older versions of {{project_name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project_name}} TemplateVM versions within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* A free and open operating system. &lt;br /&gt;
* An anti-censorship tool. &lt;br /&gt;
* The first step among many in hiding a user's identity.
|-
! scope="row"| {{project name}} Helps to
| 
* Disguise a user's IP address.&lt;br /&gt;
* Prevent ISP spying.&lt;br /&gt;
* Prevent websites from identifying the user.&lt;br /&gt;
* Prevent malware from identifying the user.&lt;br /&gt;
* Circumvent censorship.
|-
! scope="row"| {{project name}} is not
| 
* A one-click anonymization solution.
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>93w1uvesrmd5ltb35eutkvux4oezjt4</sha1>
    </revision>
    <revision>
      <id>60937</id>
      <parentid>58810</parentid>
      <timestamp>2020-11-26T22:30:28Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "[[{{q_project_name_short}}|{{q_project_name}}]]" to "[[Qubes|{{q_project_name}}]]"</comment>
      <origin>60937</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="10426" sha1="8laqwj74417a2a966w8l3ufg0lak700" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2020 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.whonix.org/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''10'' || [https://www.debian.org/releases/buster/ buster]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 15" and status "Open".
&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[Qubes|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} TemplateVMs are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} TemplateVMs in Qubes.

This policy requires {{project_name}} TemplateVM users to stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project_name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project_name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project_name}} TemplateVMs are released, older versions of {{project_name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project_name}} TemplateVM versions within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* A free and open operating system. &lt;br /&gt;
* An anti-censorship tool. &lt;br /&gt;
* The first step among many in hiding a user's identity.
|-
! scope="row"| {{project name}} Helps to
| 
* Disguise a user's IP address.&lt;br /&gt;
* Prevent ISP spying.&lt;br /&gt;
* Prevent websites from identifying the user.&lt;br /&gt;
* Prevent malware from identifying the user.&lt;br /&gt;
* Circumvent censorship.
|-
! scope="row"| {{project name}} is not
| 
* A one-click anonymization solution.
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>8laqwj74417a2a966w8l3ufg0lak700</sha1>
    </revision>
    <revision>
      <id>61610</id>
      <parentid>60937</parentid>
      <timestamp>2020-12-26T10:01:10Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "|image=https://www.whonix.org/w/images/" to "|image=https://www.{{project_clearnet}}/w/images/"</comment>
      <origin>61610</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="10436" sha1="hi4pkdjaxsmb5bxkj5mkxl57e09qati" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2020 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''10'' || [https://www.debian.org/releases/buster/ buster]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 15" and status "Open".
&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[Qubes|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} TemplateVMs are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} TemplateVMs in Qubes.

This policy requires {{project_name}} TemplateVM users to stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project_name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project_name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project_name}} TemplateVMs are released, older versions of {{project_name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project_name}} TemplateVM versions within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* A free and open operating system. &lt;br /&gt;
* An anti-censorship tool. &lt;br /&gt;
* The first step among many in hiding a user's identity.
|-
! scope="row"| {{project name}} Helps to
| 
* Disguise a user's IP address.&lt;br /&gt;
* Prevent ISP spying.&lt;br /&gt;
* Prevent websites from identifying the user.&lt;br /&gt;
* Prevent malware from identifying the user.&lt;br /&gt;
* Circumvent censorship.
|-
! scope="row"| {{project name}} is not
| 
* A one-click anonymization solution.
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>hi4pkdjaxsmb5bxkj5mkxl57e09qati</sha1>
    </revision>
    <revision>
      <id>63907</id>
      <parentid>61610</parentid>
      <timestamp>2021-03-29T19:47:08Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "2020 ENCRYPTED SUPPORT LP" to "2021 ENCRYPTED SUPPORT LP"</comment>
      <origin>63907</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="10436" sha1="sg2v4wcc84thddbykve8xmsy6kxkkvs" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''10'' || [https://www.debian.org/releases/buster/ buster]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 15" and status "Open".
&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[Qubes|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} TemplateVMs are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} TemplateVMs in Qubes.

This policy requires {{project_name}} TemplateVM users to stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project_name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project_name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project_name}} TemplateVMs are released, older versions of {{project_name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project_name}} TemplateVM versions within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* A free and open operating system. &lt;br /&gt;
* An anti-censorship tool. &lt;br /&gt;
* The first step among many in hiding a user's identity.
|-
! scope="row"| {{project name}} Helps to
| 
* Disguise a user's IP address.&lt;br /&gt;
* Prevent ISP spying.&lt;br /&gt;
* Prevent websites from identifying the user.&lt;br /&gt;
* Prevent malware from identifying the user.&lt;br /&gt;
* Circumvent censorship.
|-
! scope="row"| {{project name}} is not
| 
* A one-click anonymization solution.
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>sg2v4wcc84thddbykve8xmsy6kxkkvs</sha1>
    </revision>
    <revision>
      <id>64821</id>
      <parentid>63907</parentid>
      <timestamp>2021-04-24T11:16:32Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* {{project_name_short}} Version */</comment>
      <origin>64821</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="10472" sha1="mhn9f5c8ykdmeuj1nft7bp4tak4voyp" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''{{Debian Stable Version Number Short}}'' || [https://www.debian.org/releases/buster/ buster]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 15" and status "Open".
&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[Qubes|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} TemplateVMs are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} TemplateVMs in Qubes.

This policy requires {{project_name}} TemplateVM users to stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project_name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project_name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project_name}} TemplateVMs are released, older versions of {{project_name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project_name}} TemplateVM versions within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* A free and open operating system. &lt;br /&gt;
* An anti-censorship tool. &lt;br /&gt;
* The first step among many in hiding a user's identity.
|-
! scope="row"| {{project name}} Helps to
| 
* Disguise a user's IP address.&lt;br /&gt;
* Prevent ISP spying.&lt;br /&gt;
* Prevent websites from identifying the user.&lt;br /&gt;
* Prevent malware from identifying the user.&lt;br /&gt;
* Circumvent censorship.
|-
! scope="row"| {{project name}} is not
| 
* A one-click anonymization solution.
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>mhn9f5c8ykdmeuj1nft7bp4tak4voyp</sha1>
    </revision>
    <revision>
      <id>64829</id>
      <parentid>64821</parentid>
      <timestamp>2021-04-24T11:25:46Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "{{Debian Stable Version Number Short}}" to "{{Stable_project_version_based_on_Debian_version_short}}"</comment>
      <origin>64829</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="10490" sha1="13n6usdbpnop6zm7hbje765tp84omec" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;u&gt;{{VersionNew}}&lt;/u&gt; || ''{{Stable_project_version_based_on_Debian_version_short}}'' || [https://www.debian.org/releases/buster/ buster]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 15" and status "Open".
&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[Qubes|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} TemplateVMs are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} TemplateVMs in Qubes.

This policy requires {{project_name}} TemplateVM users to stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project_name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project_name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project_name}} TemplateVMs are released, older versions of {{project_name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project_name}} TemplateVM versions within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* A free and open operating system. &lt;br /&gt;
* An anti-censorship tool. &lt;br /&gt;
* The first step among many in hiding a user's identity.
|-
! scope="row"| {{project name}} Helps to
| 
* Disguise a user's IP address.&lt;br /&gt;
* Prevent ISP spying.&lt;br /&gt;
* Prevent websites from identifying the user.&lt;br /&gt;
* Prevent malware from identifying the user.&lt;br /&gt;
* Circumvent censorship.
|-
! scope="row"| {{project name}} is not
| 
* A one-click anonymization solution.
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>13n6usdbpnop6zm7hbje765tp84omec</sha1>
    </revision>
    <revision>
      <id>64832</id>
      <parentid>64829</parentid>
      <timestamp>2021-04-24T11:27:51Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* {{project_name_short}} Version */</comment>
      <origin>64832</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="10529" sha1="ja2hobxu4z9khk1m12koswlkcsf4p2k" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/buster/ &lt;code&gt;buster&lt;/code&gt;]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 15" and status "Open".
&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[Qubes|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} TemplateVMs are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} TemplateVMs in Qubes.

This policy requires {{project_name}} TemplateVM users to stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project_name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project_name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project_name}} TemplateVMs are released, older versions of {{project_name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project_name}} TemplateVM versions within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* A free and open operating system. &lt;br /&gt;
* An anti-censorship tool. &lt;br /&gt;
* The first step among many in hiding a user's identity.
|-
! scope="row"| {{project name}} Helps to
| 
* Disguise a user's IP address.&lt;br /&gt;
* Prevent ISP spying.&lt;br /&gt;
* Prevent websites from identifying the user.&lt;br /&gt;
* Prevent malware from identifying the user.&lt;br /&gt;
* Circumvent censorship.
|-
! scope="row"| {{project name}} is not
| 
* A one-click anonymization solution.
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>ja2hobxu4z9khk1m12koswlkcsf4p2k</sha1>
    </revision>
    <revision>
      <id>64833</id>
      <parentid>64832</parentid>
      <timestamp>2021-04-24T11:28:31Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* {{project_name_short}} Version */</comment>
      <origin>64833</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="10619" sha1="cujrjwpec0uwdik74zr2ac810fri65o" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website]:

* [https://www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor]
* [https://www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works]
* [https://www.torproject.org/about/torusers.html.en Who uses Tor?]

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 15" and status "Open".
&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[Qubes|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} TemplateVMs are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} TemplateVMs in Qubes.

This policy requires {{project_name}} TemplateVM users to stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project_name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project_name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project_name}} TemplateVMs are released, older versions of {{project_name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project_name}} TemplateVM versions within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* A free and open operating system. &lt;br /&gt;
* An anti-censorship tool. &lt;br /&gt;
* The first step among many in hiding a user's identity.
|-
! scope="row"| {{project name}} Helps to
| 
* Disguise a user's IP address.&lt;br /&gt;
* Prevent ISP spying.&lt;br /&gt;
* Prevent websites from identifying the user.&lt;br /&gt;
* Prevent malware from identifying the user.&lt;br /&gt;
* Circumvent censorship.
|-
! scope="row"| {{project name}} is not
| 
* A one-click anonymization solution.
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>cujrjwpec0uwdik74zr2ac810fri65o</sha1>
    </revision>
    <revision>
      <id>65221</id>
      <parentid>64833</parentid>
      <timestamp>2021-05-05T01:19:52Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>update links, add v3 onions</comment>
      <origin>65221</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11063" sha1="8s53788ig9vk0fob084roy8v01h7b2a" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project name}} version at any time by following [[FAQ#How_do_I_Check_the_Current_{{project_name_short}}_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 15" and status "Open".
&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[Qubes|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} TemplateVMs are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} TemplateVMs in Qubes.

This policy requires {{project_name}} TemplateVM users to stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project_name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project_name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project_name}} TemplateVMs are released, older versions of {{project_name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project_name}} TemplateVM versions within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* A free and open operating system. &lt;br /&gt;
* An anti-censorship tool. &lt;br /&gt;
* The first step among many in hiding a user's identity.
|-
! scope="row"| {{project name}} Helps to
| 
* Disguise a user's IP address.&lt;br /&gt;
* Prevent ISP spying.&lt;br /&gt;
* Prevent websites from identifying the user.&lt;br /&gt;
* Prevent malware from identifying the user.&lt;br /&gt;
* Circumvent censorship.
|-
! scope="row"| {{project name}} is not
| 
* A one-click anonymization solution.
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>8s53788ig9vk0fob084roy8v01h7b2a</sha1>
    </revision>
    <revision>
      <id>65222</id>
      <parentid>65221</parentid>
      <timestamp>2021-05-05T01:23:39Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>fix link (info was moved from FAQ)</comment>
      <origin>65222</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11073" sha1="ol5d0kdzqqa1upxr7wbxyc3gopnfah6" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 15" and status "Open".
&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[Qubes|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} TemplateVMs are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} TemplateVMs in Qubes.

This policy requires {{project_name}} TemplateVM users to stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project_name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project_name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project_name}} TemplateVMs are released, older versions of {{project_name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project_name}} TemplateVM versions within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* A free and open operating system. &lt;br /&gt;
* An anti-censorship tool. &lt;br /&gt;
* The first step among many in hiding a user's identity.
|-
! scope="row"| {{project name}} Helps to
| 
* Disguise a user's IP address.&lt;br /&gt;
* Prevent ISP spying.&lt;br /&gt;
* Prevent websites from identifying the user.&lt;br /&gt;
* Prevent malware from identifying the user.&lt;br /&gt;
* Circumvent censorship.
|-
! scope="row"| {{project name}} is not
| 
* A one-click anonymization solution.
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>ol5d0kdzqqa1upxr7wbxyc3gopnfah6</sha1>
    </revision>
    <revision>
      <id>65223</id>
      <parentid>65222</parentid>
      <timestamp>2021-05-05T01:28:19Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>nits, no capitalization or full stop for incomplete sentences</comment>
      <origin>65223</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11026" sha1="lqnseguy765f3fsc4gq2v7y9zi4ttl5" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 15" and status "Open".
&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[Qubes|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} TemplateVMs are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} TemplateVMs in Qubes.

This policy requires {{project_name}} TemplateVM users to stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project_name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project_name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project_name}} TemplateVMs are released, older versions of {{project_name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project_name}} TemplateVM versions within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>lqnseguy765f3fsc4gq2v7y9zi4ttl5</sha1>
    </revision>
    <revision>
      <id>65224</id>
      <parentid>65223</parentid>
      <timestamp>2021-05-05T01:29:29Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>next release will be Whonix 16</comment>
      <origin>65224</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11026" sha1="2bo9uuw5uqngyy8fuea5wcz9g2gkuwl" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 16" and status "Open".
&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[Qubes|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} TemplateVMs are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} TemplateVMs in Qubes.

This policy requires {{project_name}} TemplateVM users to stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project_name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project_name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project_name}} TemplateVMs are released, older versions of {{project_name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project_name}} TemplateVM versions within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary of what {{project name}} is" chapter of the {{project name}} About wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>2bo9uuw5uqngyy8fuea5wcz9g2gkuwl</sha1>
    </revision>
    <revision>
      <id>65225</id>
      <parentid>65224</parentid>
      <timestamp>2021-05-05T01:32:39Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>update to reflect change titles etc.</comment>
      <origin>65225</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11009" sha1="kgqisyn3hhupcbq4ihcj2k3wya0ke9n" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;sys-whonix&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 16" and status "Open".
&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[Qubes|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} TemplateVMs are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} TemplateVMs in Qubes.

This policy requires {{project_name}} TemplateVM users to stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project_name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project_name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project_name}} TemplateVMs are released, older versions of {{project_name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project_name}} TemplateVM versions within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project name}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>kgqisyn3hhupcbq4ihcj2k3wya0ke9n</sha1>
    </revision>
    <revision>
      <id>67607</id>
      <parentid>65225</parentid>
      <timestamp>2021-09-16T15:56:40Z</timestamp>
      <contributor>
        <username>Einsiedler90</username>
        <id>4962</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "(?i)\&lt;code\&gt;sys.whonix\&lt;\/code\&gt;" to "&lt;code&gt;{{gateway_product_name_vm}}&lt;/code&gt;"</comment>
      <origin>67607</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11026" sha1="bw1brt1b1qohsyhfff5ul4us97dxvq4" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;{{gateway_product_name_vm}}&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 16" and status "Open".
&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [http://forums.whonix.org/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[Qubes|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} TemplateVMs are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} TemplateVMs in Qubes.

This policy requires {{project_name}} TemplateVM users to stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project_name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project_name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project_name}} TemplateVMs are released, older versions of {{project_name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project_name}} TemplateVM versions within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project name}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>bw1brt1b1qohsyhfff5ul4us97dxvq4</sha1>
    </revision>
    <revision>
      <id>68261</id>
      <parentid>67607</parentid>
      <timestamp>2021-09-29T11:14:40Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Support Schedule */</comment>
      <origin>68261</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11037" sha1="4ob8jppv64lbyqd0zth08vuuizkmj0a" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;{{gateway_product_name_vm}}&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 16" and status "Open".
&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project clearnet}}/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-versions/#whonix [[Qubes|{{q_project_name}}]] version support policy]:

&lt;blockquote&gt;
{{project_name}} TemplateVMs are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} TemplateVMs in Qubes.

This policy requires {{project_name}} TemplateVM users to stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project_name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project_name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project_name}} TemplateVMs are released, older versions of {{project_name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project_name}} TemplateVM versions within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project name}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>4ob8jppv64lbyqd0zth08vuuizkmj0a</sha1>
    </revision>
    <revision>
      <id>68262</id>
      <parentid>68261</parentid>
      <timestamp>2021-09-29T11:18:05Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Qubes Hosts */</comment>
      <origin>68262</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11043" sha1="fa6t1w0pk5xyvxgtdqlmjdixk4jx1ea" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;{{gateway_product_name_vm}}&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 16" and status "Open".
&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project clearnet}}/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;
{{project_name}} TemplateVMs are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} TemplateVMs in Qubes.

This policy requires {{project_name}} TemplateVM users to stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project_name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project_name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project_name}} TemplateVMs are released, older versions of {{project_name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project_name}} TemplateVM versions within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.
&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project name}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>fa6t1w0pk5xyvxgtdqlmjdixk4jx1ea</sha1>
    </revision>
    <revision>
      <id>68263</id>
      <parentid>68262</parentid>
      <timestamp>2021-09-29T11:18:15Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Qubes Hosts */</comment>
      <origin>68263</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11041" sha1="sijou2i8uxb21h6tlaq57bbij4fv9gy" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;{{gateway_product_name_vm}}&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 16" and status "Open".
&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project clearnet}}/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name}} TemplateVMs are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} TemplateVMs in Qubes.

This policy requires {{project_name}} TemplateVM users to stay reasonably close to the cutting edge by upgrading to new stable versions of Qubes OS and {{project_name}} TemplateVMs within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, {{project_name}} TemplateVMs will no longer be supported on any older version of Qubes OS. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable Qubes OS version within one month of its release.
* One month after new stable versions of {{project_name}} TemplateVMs are released, older versions of {{project_name}} TemplateVMs will no longer be supported. This means that users who wish to continue using {{project_name}} TemplateVMs on Qubes must always upgrade to the latest stable {{project_name}} TemplateVM versions within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project name}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>sijou2i8uxb21h6tlaq57bbij4fv9gy</sha1>
    </revision>
    <revision>
      <id>68264</id>
      <parentid>68263</parentid>
      <timestamp>2021-09-29T11:20:43Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Qubes Hosts */</comment>
      <origin>68264</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="10902" sha1="jkioncgqt2zaqnv24x7dhlta1ecvq22" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;{{gateway_product_name_vm}}&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 16" and status "Open".
&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project clearnet}}/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;Whonix templates are supported by our partner, the Whonix Project. The Whonix Project has set its own support policy for Whonix templates in Qubes.

This policy requires Whonix template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and Whonix templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, Whonix templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using Whonix templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of Whonix templates are released, older releases of Whonix templates will no longer be supported. This means that users who wish to continue using Whonix templates on Qubes must always upgrade to the latest stable Whonix template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project name}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>jkioncgqt2zaqnv24x7dhlta1ecvq22</sha1>
    </revision>
    <revision>
      <id>68343</id>
      <parentid>68264</parentid>
      <timestamp>2021-09-29T22:11:02Z</timestamp>
      <contributor>
        <username>Einsiedler90</username>
        <id>4962</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "(?i)Whonix\stemplate" to "{{project_name}} template"</comment>
      <origin>68343</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11002" sha1="r93lfvek97410y5512oe6gukl0e4foa" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;{{gateway_product_name_vm}}&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 16" and status "Open".
&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project clearnet}}/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name}} templates are supported by our partner, the Whonix Project. The Whonix Project has set its own support policy for {{project_name}} templates in Qubes.

This policy requires {{project_name}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name}} templates are released, older releases of {{project_name}} templates will no longer be supported. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable {{project_name}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project name}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>r93lfvek97410y5512oe6gukl0e4foa</sha1>
    </revision>
    <revision>
      <id>68355</id>
      <parentid>68343</parentid>
      <timestamp>2021-09-29T22:19:00Z</timestamp>
      <contributor>
        <username>Einsiedler90</username>
        <id>4962</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "Whonix.Project" to "{{project_name}} Project"</comment>
      <origin>68355</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11022" sha1="tcayi5hlgku1tj1nf780bsdf2ql4ah7" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;{{gateway_product_name_vm}}&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 16" and status "Open".
&lt;/ref&gt; and [[{{project name short}}_Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project clearnet}}/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name}} templates are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} templates in Qubes.

This policy requires {{project_name}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name}} templates are released, older releases of {{project_name}} templates will no longer be supported. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable {{project_name}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project name}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>tcayi5hlgku1tj1nf780bsdf2ql4ah7</sha1>
    </revision>
    <revision>
      <id>70882</id>
      <parentid>68355</parentid>
      <timestamp>2021-11-22T17:55:33Z</timestamp>
      <contributor>
        <username>Einsiedler90</username>
        <id>4962</id>
      </contributor>
      <origin>70882</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="10999" sha1="ks0xywy5zqcbcf1dicongpn1gotwras" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why_{{project_name_short}}_is_Freedom_Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;{{gateway_product_name_vm}}&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project clearnet}}/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name}} templates are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} templates in Qubes.

This policy requires {{project_name}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name}} templates are released, older releases of {{project_name}} templates will no longer be supported. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable {{project_name}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project name}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>ks0xywy5zqcbcf1dicongpn1gotwras</sha1>
    </revision>
    <revision>
      <id>71134</id>
      <parentid>70882</parentid>
      <timestamp>2021-11-24T07:12:01Z</timestamp>
      <contributor>
        <username>Einsiedler90</username>
        <id>4962</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "(?i)\[\[Why.{1,30}is.Freedom.Software" to "[[Why Project is Freedom Software"</comment>
      <origin>71134</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="10984" sha1="1zbym0tg86263s0vx75303s10pc4yoq" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Why Project is Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;{{gateway_product_name_vm}}&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project clearnet}}/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name}} templates are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} templates in Qubes.

This policy requires {{project_name}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name}} templates are released, older releases of {{project_name}} templates will no longer be supported. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable {{project_name}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project name}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>1zbym0tg86263s0vx75303s10pc4yoq</sha1>
    </revision>
    <revision>
      <id>71203</id>
      <parentid>71134</parentid>
      <timestamp>2021-11-24T12:01:10Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "Why Project is Freedom Software" to "Reasons for Freedom Software"</comment>
      <origin>71203</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="10981" sha1="j61lhu7s1v39it2l5jezf8b8caplu22" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;{{gateway_product_name_vm}}&lt;/code&gt; and &lt;code&gt;anon-whonix&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project clearnet}}/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name}} templates are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} templates in Qubes.

This policy requires {{project_name}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name}} templates are released, older releases of {{project_name}} templates will no longer be supported. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable {{project_name}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project name}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>j61lhu7s1v39it2l5jezf8b8caplu22</sha1>
    </revision>
    <revision>
      <id>71265</id>
      <parentid>71203</parentid>
      <timestamp>2021-11-24T12:11:07Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "anon-whonix" to "{{workstation_product_name_vm}}"</comment>
      <origin>71265</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11001" sha1="4dem1sywhgtrvnj6nb0flsmmfsr7mgs" xml:space="preserve">&lt;!--
Copyright:

   {{project name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;{{gateway_product_name_vm}}&lt;/code&gt; and &lt;code&gt;{{workstation_product_name_vm}}&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project name}} safely.

'''New {{project name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project clearnet}}/c/news {{project name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name}} templates are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} templates in Qubes.

This policy requires {{project_name}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name}} templates are released, older releases of {{project_name}} templates will no longer be supported. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable {{project_name}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project name}} and Tor.
* Further information about {{project name}} [[Features]].
* The implied [[Trust]] placed in {{project name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project name}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>4dem1sywhgtrvnj6nb0flsmmfsr7mgs</sha1>
    </revision>
    <revision>
      <id>71615</id>
      <parentid>71265</parentid>
      <timestamp>2021-12-01T09:46:35Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "(?i)\{\{project.name\}\}" to "{{project_name}}"</comment>
      <origin>71615</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11001" sha1="m4p02wby57t3yk716x3arhuwheney4k" xml:space="preserve">&lt;!--
Copyright:

   {{project_name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project_name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project_name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;{{gateway_product_name_vm}}&lt;/code&gt; and &lt;code&gt;{{workstation_product_name_vm}}&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project_name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name}} safely.

'''New {{project_name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project clearnet}}/c/news {{project_name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name}} templates are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} templates in Qubes.

This policy requires {{project_name}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name}} templates are released, older releases of {{project_name}} templates will no longer be supported. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable {{project_name}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project_name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name}} and Tor.
* Further information about {{project_name}} [[Features]].
* The implied [[Trust]] placed in {{project_name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>m4p02wby57t3yk716x3arhuwheney4k</sha1>
    </revision>
    <revision>
      <id>71803</id>
      <parentid>71615</parentid>
      <timestamp>2021-12-01T17:37:16Z</timestamp>
      <contributor>
        <username>Einsiedler90</username>
        <id>4962</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "(?i)\{\{(\w{1,10})\s(\w{1,10})\}\}" to "{{{$1}_{$2}}}"</comment>
      <origin>71803</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11005" sha1="ix0rgh2uhvsi8swhmsl00m6bvktdcvl" xml:space="preserve">&lt;!--
Copyright:

   {{project_name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project_name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project_name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;{{gateway_product_name_vm}}&lt;/code&gt; and &lt;code&gt;{{workstation_product_name_vm}}&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project_name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name}} safely.

'''New {{project_name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{{project}_{clearnet}}}/c/news {{project_name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name}} templates are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} templates in Qubes.

This policy requires {{project_name}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name}} templates are released, older releases of {{project_name}} templates will no longer be supported. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable {{project_name}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project_name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name}} and Tor.
* Further information about {{project_name}} [[Features]].
* The implied [[Trust]] placed in {{project_name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>ix0rgh2uhvsi8swhmsl00m6bvktdcvl</sha1>
    </revision>
    <revision>
      <id>71804</id>
      <parentid>71803</parentid>
      <timestamp>2021-12-01T17:45:57Z</timestamp>
      <contributor>
        <username>Einsiedler90</username>
        <id>4962</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "(?i)\{\{(\w+)\s(\w+)\s(\w+)\s(\w+)\}\}" to "{{{$1}_{$2}_{$3}_{$4}}}"</comment>
      <origin>71804</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11021" sha1="kiq5qf3prjonyp76zoqtz0fow7wh68h" xml:space="preserve">&lt;!--
Copyright:

   {{project_name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project_name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project_name}} configuration and may use either a Type I hypervisor ([[{{{q}_{project}_{name}_{short}}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{{q}_{project}_{name}_{short}}}|{{q project name}}]], these VMs are named &lt;code&gt;{{gateway_product_name_vm}}&lt;/code&gt; and &lt;code&gt;{{workstation_product_name_vm}}&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project_name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name}} safely.

'''New {{project_name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{{project}_{clearnet}}}/c/news {{project_name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name}} templates are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} templates in Qubes.

This policy requires {{project_name}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name}} templates are released, older releases of {{project_name}} templates will no longer be supported. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable {{project_name}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project_name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name}} and Tor.
* Further information about {{project_name}} [[Features]].
* The implied [[Trust]] placed in {{project_name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>kiq5qf3prjonyp76zoqtz0fow7wh68h</sha1>
    </revision>
    <revision>
      <id>71807</id>
      <parentid>71804</parentid>
      <timestamp>2021-12-01T18:11:57Z</timestamp>
      <contributor>
        <username>Einsiedler90</username>
        <id>4962</id>
      </contributor>
      <minor/>
      <comment>Reverted edits by [[Special:Contributions/Einsiedler90|Einsiedler90]] ([[User talk:Einsiedler90|talk]]) to last revision by [[User:Patrick|Patrick]]</comment>
      <origin>71615</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11001" sha1="m4p02wby57t3yk716x3arhuwheney4k" xml:space="preserve">&lt;!--
Copyright:

   {{project_name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project_name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project_name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;{{gateway_product_name_vm}}&lt;/code&gt; and &lt;code&gt;{{workstation_product_name_vm}}&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project_name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name}} safely.

'''New {{project_name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project clearnet}}/c/news {{project_name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name}} templates are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} templates in Qubes.

This policy requires {{project_name}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name}} templates are released, older releases of {{project_name}} templates will no longer be supported. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable {{project_name}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project_name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name}} and Tor.
* Further information about {{project_name}} [[Features]].
* The implied [[Trust]] placed in {{project_name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>m4p02wby57t3yk716x3arhuwheney4k</sha1>
    </revision>
    <revision>
      <id>71808</id>
      <parentid>71807</parentid>
      <timestamp>2021-12-01T18:16:16Z</timestamp>
      <contributor>
        <username>Einsiedler90</username>
        <id>4962</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "\{\{(\w+)\s(\w+)\s(\w+)\s(\w+)\}\}" to "\{\{{$1}_{$2}_{$3}_{$4}\}\}"</comment>
      <origin>71808</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11025" sha1="bknp2fcggto44y01rsoow0ytqypvfxb" xml:space="preserve">&lt;!--
Copyright:

   {{project_name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project_name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project_name}} configuration and may use either a Type I hypervisor ([[\{\{{q}_{project}_{name}_{short}\}\}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[\{\{{q}_{project}_{name}_{short}\}\}|{{q project name}}]], these VMs are named &lt;code&gt;{{gateway_product_name_vm}}&lt;/code&gt; and &lt;code&gt;{{workstation_product_name_vm}}&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project_name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name}} safely.

'''New {{project_name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project clearnet}}/c/news {{project_name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name}} templates are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} templates in Qubes.

This policy requires {{project_name}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name}} templates are released, older releases of {{project_name}} templates will no longer be supported. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable {{project_name}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project_name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name}} and Tor.
* Further information about {{project_name}} [[Features]].
* The implied [[Trust]] placed in {{project_name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>bknp2fcggto44y01rsoow0ytqypvfxb</sha1>
    </revision>
    <revision>
      <id>71809</id>
      <parentid>71808</parentid>
      <timestamp>2021-12-01T18:17:37Z</timestamp>
      <contributor>
        <username>Einsiedler90</username>
        <id>4962</id>
      </contributor>
      <minor/>
      <comment>Reverted edits by [[Special:Contributions/Einsiedler90|Einsiedler90]] ([[User talk:Einsiedler90|talk]]) to last revision by [[User:Patrick|Patrick]]</comment>
      <origin>71615</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11001" sha1="m4p02wby57t3yk716x3arhuwheney4k" xml:space="preserve">&lt;!--
Copyright:

   {{project_name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project_name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project_name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;{{gateway_product_name_vm}}&lt;/code&gt; and &lt;code&gt;{{workstation_product_name_vm}}&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project_name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name}} safely.

'''New {{project_name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project clearnet}}/c/news {{project_name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name}} templates are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} templates in Qubes.

This policy requires {{project_name}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name}} templates are released, older releases of {{project_name}} templates will no longer be supported. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable {{project_name}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project_name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name}} and Tor.
* Further information about {{project_name}} [[Features]].
* The implied [[Trust]] placed in {{project_name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>m4p02wby57t3yk716x3arhuwheney4k</sha1>
    </revision>
    <revision>
      <id>71810</id>
      <parentid>71809</parentid>
      <timestamp>2021-12-01T18:22:02Z</timestamp>
      <contributor>
        <username>Einsiedler90</username>
        <id>4962</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "\{\{(\w{1,10})\s(\w{1,10})\s(\w{1,10})\s(\w{1,10})\}\}" to "{{{$1}_{$2}_{$3}_{$4}}}"</comment>
      <origin>71810</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11017" sha1="otb3x4gxke6d3953gzvswzu0286m2lu" xml:space="preserve">&lt;!--
Copyright:

   {{project_name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project_name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project_name}} configuration and may use either a Type I hypervisor ([[{{{q}_{project}_{name}_{short}}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{{q}_{project}_{name}_{short}}}|{{q project name}}]], these VMs are named &lt;code&gt;{{gateway_product_name_vm}}&lt;/code&gt; and &lt;code&gt;{{workstation_product_name_vm}}&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project_name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name}} safely.

'''New {{project_name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project clearnet}}/c/news {{project_name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name}} templates are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} templates in Qubes.

This policy requires {{project_name}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name}} templates are released, older releases of {{project_name}} templates will no longer be supported. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable {{project_name}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project_name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name}} and Tor.
* Further information about {{project_name}} [[Features]].
* The implied [[Trust]] placed in {{project_name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>otb3x4gxke6d3953gzvswzu0286m2lu</sha1>
    </revision>
    <revision>
      <id>71811</id>
      <parentid>71810</parentid>
      <timestamp>2021-12-01T18:23:24Z</timestamp>
      <contributor>
        <username>Einsiedler90</username>
        <id>4962</id>
      </contributor>
      <minor/>
      <comment>Reverted edits by [[Special:Contributions/Einsiedler90|Einsiedler90]] ([[User talk:Einsiedler90|talk]]) to last revision by [[User:Patrick|Patrick]]</comment>
      <origin>71615</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11001" sha1="m4p02wby57t3yk716x3arhuwheney4k" xml:space="preserve">&lt;!--
Copyright:

   {{project_name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project_name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project_name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;{{gateway_product_name_vm}}&lt;/code&gt; and &lt;code&gt;{{workstation_product_name_vm}}&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project_name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name}} safely.

'''New {{project_name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project clearnet}}/c/news {{project_name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name}} templates are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} templates in Qubes.

This policy requires {{project_name}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name}} templates are released, older releases of {{project_name}} templates will no longer be supported. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable {{project_name}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project_name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name}} and Tor.
* Further information about {{project_name}} [[Features]].
* The implied [[Trust]] placed in {{project_name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>m4p02wby57t3yk716x3arhuwheney4k</sha1>
    </revision>
    <revision>
      <id>71812</id>
      <parentid>71811</parentid>
      <timestamp>2021-12-01T18:31:38Z</timestamp>
      <contributor>
        <username>Einsiedler90</username>
        <id>4962</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "\{\{(\w+)\s(\w+)\s(\w+)\s(\w+)\}\}" to "{{$1_$2_$3_$4}}"</comment>
      <origin>71812</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11001" sha1="pwzs5lw1gjcezc6g02hzxpcvev3b585" xml:space="preserve">&lt;!--
Copyright:

   {{project_name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project_name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project_name}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q_project_name_short}}|{{q project name}}]], these VMs are named &lt;code&gt;{{gateway_product_name_vm}}&lt;/code&gt; and &lt;code&gt;{{workstation_product_name_vm}}&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project_name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name}} safely.

'''New {{project_name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project clearnet}}/c/news {{project_name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name}} templates are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} templates in Qubes.

This policy requires {{project_name}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name}} templates are released, older releases of {{project_name}} templates will no longer be supported. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable {{project_name}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project_name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name}} and Tor.
* Further information about {{project_name}} [[Features]].
* The implied [[Trust]] placed in {{project_name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>pwzs5lw1gjcezc6g02hzxpcvev3b585</sha1>
    </revision>
    <revision>
      <id>71813</id>
      <parentid>71812</parentid>
      <timestamp>2021-12-01T18:32:30Z</timestamp>
      <contributor>
        <username>Einsiedler90</username>
        <id>4962</id>
      </contributor>
      <minor/>
      <comment>Reverted edits by [[Special:Contributions/Einsiedler90|Einsiedler90]] ([[User talk:Einsiedler90|talk]]) to last revision by [[User:Patrick|Patrick]]</comment>
      <origin>71615</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11001" sha1="m4p02wby57t3yk716x3arhuwheney4k" xml:space="preserve">&lt;!--
Copyright:

   {{project_name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project_name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project_name}} configuration and may use either a Type I hypervisor ([[{{q project name short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q project name short}}|{{q project name}}]], these VMs are named &lt;code&gt;{{gateway_product_name_vm}}&lt;/code&gt; and &lt;code&gt;{{workstation_product_name_vm}}&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project_name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name}} safely.

'''New {{project_name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project clearnet}}/c/news {{project_name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name}} templates are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} templates in Qubes.

This policy requires {{project_name}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name}} templates are released, older releases of {{project_name}} templates will no longer be supported. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable {{project_name}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project_name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name}} and Tor.
* Further information about {{project_name}} [[Features]].
* The implied [[Trust]] placed in {{project_name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>m4p02wby57t3yk716x3arhuwheney4k</sha1>
    </revision>
    <revision>
      <id>71816</id>
      <parentid>71813</parentid>
      <timestamp>2021-12-01T20:47:18Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "\{\{(\w+)\s(\w+)\s(\w+)\s(\w+)\}\}" to "{{$1_$2_$3_$4}}"</comment>
      <origin>71816</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11001" sha1="pwzs5lw1gjcezc6g02hzxpcvev3b585" xml:space="preserve">&lt;!--
Copyright:

   {{project_name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project_name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project_name}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q project name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q_project_name_short}}|{{q project name}}]], these VMs are named &lt;code&gt;{{gateway_product_name_vm}}&lt;/code&gt; and &lt;code&gt;{{workstation_product_name_vm}}&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based on Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project_name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name}} safely.

'''New {{project_name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project clearnet}}/c/news {{project_name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name}} templates are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} templates in Qubes.

This policy requires {{project_name}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name}} templates are released, older releases of {{project_name}} templates will no longer be supported. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable {{project_name}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project_name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name}} and Tor.
* Further information about {{project_name}} [[Features]].
* The implied [[Trust]] placed in {{project_name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>pwzs5lw1gjcezc6g02hzxpcvev3b585</sha1>
    </revision>
    <revision>
      <id>72232</id>
      <parentid>71816</parentid>
      <timestamp>2021-12-01T22:36:48Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "\{\{(\w+)\s(\w+)\s(\w+)\}\}" to "{{$1_$2_$3}}"</comment>
      <origin>72232</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11001" sha1="rj2on67b4irkzqk65tyu19m9w17xma9" xml:space="preserve">&lt;!--
Copyright:

   {{project_name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project_name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project_name}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{gateway_product_name_vm}}&lt;/code&gt; and &lt;code&gt;{{workstation_product_name_vm}}&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project_name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name}} safely.

'''New {{project_name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project clearnet}}/c/news {{project_name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name}} templates are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} templates in Qubes.

This policy requires {{project_name}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name}} templates are released, older releases of {{project_name}} templates will no longer be supported. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable {{project_name}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project_name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name}} and Tor.
* Further information about {{project_name}} [[Features]].
* The implied [[Trust]] placed in {{project_name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>rj2on67b4irkzqk65tyu19m9w17xma9</sha1>
    </revision>
    <revision>
      <id>72474</id>
      <parentid>72232</parentid>
      <timestamp>2021-12-01T22:43:16Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "\{\{(\w+)\s(\w+)\}\}" to "{{$1_$2}}"</comment>
      <origin>72474</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11001" sha1="b3cv7wquu2rk28tj63cwd9gcs448wpk" xml:space="preserve">&lt;!--
Copyright:

   {{project_name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{gateway_product_name_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project_name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project_name}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{gateway_product_name_vm}}&lt;/code&gt; and &lt;code&gt;{{workstation_product_name_vm}}&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project_name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name}} safely.

'''New {{project_name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name}} templates are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} templates in Qubes.

This policy requires {{project_name}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name}} templates are released, older releases of {{project_name}} templates will no longer be supported. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable {{project_name}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project_name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name}} and Tor.
* Further information about {{project_name}} [[Features]].
* The implied [[Trust]] placed in {{project_name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>b3cv7wquu2rk28tj63cwd9gcs448wpk</sha1>
    </revision>
    <revision>
      <id>72646</id>
      <parentid>72474</parentid>
      <timestamp>2021-12-02T00:12:39Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "(?i)gateway.product.name.short" to "project_name_gateway_short"</comment>
      <origin>72646</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11001" sha1="rcay4u5nkvv371ey6z6f2j0n6c95t4t" xml:space="preserve">&lt;!--
Copyright:

   {{project_name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project_name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project_name}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{gateway_product_name_vm}}&lt;/code&gt; and &lt;code&gt;{{workstation_product_name_vm}}&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project_name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name}} safely.

'''New {{project_name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name}} templates are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} templates in Qubes.

This policy requires {{project_name}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name}} templates are released, older releases of {{project_name}} templates will no longer be supported. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable {{project_name}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project_name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name}} and Tor.
* Further information about {{project_name}} [[Features]].
* The implied [[Trust]] placed in {{project_name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>rcay4u5nkvv371ey6z6f2j0n6c95t4t</sha1>
    </revision>
    <revision>
      <id>72763</id>
      <parentid>72646</parentid>
      <timestamp>2021-12-02T00:18:16Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "(?i)gateway_product_name_vm" to "project_name_gateway_vm"</comment>
      <origin>72763</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11001" sha1="75eth44wsd2bc0m8thqjhefzzvrs3xv" xml:space="preserve">&lt;!--
Copyright:

   {{project_name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{gateway_product_name}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project_name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project_name}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{gateway_product_name}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{workstation_product_name_vm}}&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project_name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name}} safely.

'''New {{project_name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name}} templates are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} templates in Qubes.

This policy requires {{project_name}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name}} templates are released, older releases of {{project_name}} templates will no longer be supported. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable {{project_name}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project_name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name}} and Tor.
* Further information about {{project_name}} [[Features]].
* The implied [[Trust]] placed in {{project_name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>75eth44wsd2bc0m8thqjhefzzvrs3xv</sha1>
    </revision>
    <revision>
      <id>72874</id>
      <parentid>72763</parentid>
      <timestamp>2021-12-02T00:22:15Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "(?i)gateway_product_name" to "project_name_gateway_long"</comment>
      <origin>72874</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11011" sha1="3emk4dmsjt1hzixdvvfr8b0b0m36k4g" xml:space="preserve">&lt;!--
Copyright:

   {{project_name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project_name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project_name}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{project_name_gateway_long}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{workstation_product_name_vm}}&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project_name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name}} safely.

'''New {{project_name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name}} templates are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} templates in Qubes.

This policy requires {{project_name}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name}} templates are released, older releases of {{project_name}} templates will no longer be supported. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable {{project_name}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project_name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name}} and Tor.
* Further information about {{project_name}} [[Features]].
* The implied [[Trust]] placed in {{project_name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>3emk4dmsjt1hzixdvvfr8b0b0m36k4g</sha1>
    </revision>
    <revision>
      <id>73095</id>
      <parentid>72874</parentid>
      <timestamp>2021-12-02T00:31:24Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "(?i)workstation_product_name_vm" to "project_name_workstation_vm"</comment>
      <origin>73095</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11011" sha1="fshlsvcpkhivl54odjm81s9ds7zzyny" xml:space="preserve">&lt;!--
Copyright:

   {{project_name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{workstation_product_name_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project_name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project_name}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{project_name_gateway_long}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project_name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name}} safely.

'''New {{project_name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name}} templates are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} templates in Qubes.

This policy requires {{project_name}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name}} templates are released, older releases of {{project_name}} templates will no longer be supported. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable {{project_name}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project_name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name}} and Tor.
* Further information about {{project_name}} [[Features]].
* The implied [[Trust]] placed in {{project_name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>fshlsvcpkhivl54odjm81s9ds7zzyny</sha1>
    </revision>
    <revision>
      <id>73139</id>
      <parentid>73095</parentid>
      <timestamp>2021-12-02T00:43:02Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "(?i)workstation_product_name_short" to "project_name_workstation_short"</comment>
      <origin>73139</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11011" sha1="fn143k1qimkp655wzapg1ai0b3j3z29" xml:space="preserve">&lt;!--
Copyright:

   {{project_name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{workstation_product_name}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project_name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project_name}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{workstation_product_name}} for work activities and {{project_name_gateway_long}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project_name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name}} safely.

'''New {{project_name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name}} templates are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} templates in Qubes.

This policy requires {{project_name}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name}} templates are released, older releases of {{project_name}} templates will no longer be supported. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable {{project_name}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project_name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name}} and Tor.
* Further information about {{project_name}} [[Features]].
* The implied [[Trust]] placed in {{project_name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>fn143k1qimkp655wzapg1ai0b3j3z29</sha1>
    </revision>
    <revision>
      <id>73201</id>
      <parentid>73139</parentid>
      <timestamp>2021-12-02T00:48:09Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "(?i)workstation_product_name" to "project_name_workstation_long"</comment>
      <origin>73201</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11021" sha1="osx7725ecxffdqnq1mgs1xx4rzx5zr9" xml:space="preserve">&lt;!--
Copyright:

   {{project_name}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project_name}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project_name}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name}} is divided into two VMs: {{project_name_workstation_long}} for work activities and {{project_name_gateway_long}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name}} Version}}
= {{project_name_short}} Version =
Each {{project_name}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name}} safely.

'''New {{project_name}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name}} templates are supported by our partner, the {{project_name}} Project. The {{project_name}} Project has set its own support policy for {{project_name}} templates in Qubes.

This policy requires {{project_name}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name}} templates are released, older releases of {{project_name}} templates will no longer be supported. This means that users who wish to continue using {{project_name}} templates on Qubes must always upgrade to the latest stable {{project_name}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project_name}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name}} and Tor.
* Further information about {{project_name}} [[Features]].
* The implied [[Trust]] placed in {{project_name}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>osx7725ecxffdqnq1mgs1xx4rzx5zr9</sha1>
    </revision>
    <revision>
      <id>73631</id>
      <parentid>73201</parentid>
      <timestamp>2021-12-02T00:56:02Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "{{project_name}}" to "{{project_name_long}}"</comment>
      <origin>73631</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11271" sha1="q26qnsx9x8imiq7ht2b0gfviydbyra5" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt;
&lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Title|title=Design and Goals}}
{{Header}}
{{#seo:
|description={{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name_long}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name_long}} is divided into two VMs: {{project_name_workstation_long}} for work activities and {{project_name_gateway_long}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}
= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name_long}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>q26qnsx9x8imiq7ht2b0gfviydbyra5</sha1>
    </revision>
    <revision>
      <id>77817</id>
      <parentid>73631</parentid>
      <timestamp>2022-01-17T21:37:59Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>77817</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11273" sha1="qgiizsb45xzhi3as67c4k2855zghaw1" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}}
{{Title|title=
Design and Goals
}}
{{#seo:
|description={{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name_long}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name_long}} is divided into two VMs: {{project_name_workstation_long}} for work activities and {{project_name_gateway_long}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}
= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name_long}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>qgiizsb45xzhi3as67c4k2855zghaw1</sha1>
    </revision>
    <revision>
      <id>77818</id>
      <parentid>77817</parentid>
      <timestamp>2022-01-17T21:38:14Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>77818</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11273" sha1="cdu8wn3vzc2d7e4n2tlxxs4en3i9tz7" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt; {{Header}}
{{Title|title=
Design and Goals
}}
{{#seo:
|description={{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name_long}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name_long}} is divided into two VMs: {{project_name_workstation_long}} for work activities and {{project_name_gateway_long}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}
= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name_long}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>cdu8wn3vzc2d7e4n2tlxxs4en3i9tz7</sha1>
    </revision>
    <revision>
      <id>77819</id>
      <parentid>77818</parentid>
      <timestamp>2022-01-17T21:38:35Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>77819</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11273" sha1="nwyn3rhycdvstvwf7k2mqn93x3aqmmz" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/7/70/Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name_long}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name_long}} is divided into two VMs: {{project_name_workstation_long}} for work activities and {{project_name_gateway_long}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}
= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name_long}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>nwyn3rhycdvstvwf7k2mqn93x3aqmmz</sha1>
    </revision>
    <revision>
      <id>82029</id>
      <parentid>77819</parentid>
      <timestamp>2022-03-05T12:09:27Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>82029</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11312" sha1="eletzf6az53a4ldqpll4vdghzabacno" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind.

{{project_name_long}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work. Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;https://www.torproject.org/about/overview.html.en&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;https://en.wikipedia.org/wiki/Debian&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name_long}} is divided into two VMs: {{project_name_workstation_long}} for work activities and {{project_name_gateway_long}} to enforce all Internet traffic through the Tor network. &lt;ref&gt;In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}
= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name_long}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>eletzf6az53a4ldqpll4vdghzabacno</sha1>
    </revision>
    <revision>
      <id>82035</id>
      <parentid>82029</parentid>
      <timestamp>2022-03-05T17:17:04Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>82035</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11582" sha1="pe2ieirv2qazlmmuokkuozr10cqo4y0" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project name long}} routes all traffic through Tor, which is an anonymity network.

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name_long}} is divided into two VMs: {{project_name_workstation_long}} for work activities and {{project_name_gateway_long}} to enforce routing all Internet traffic through the Tor network. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}
= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name_long}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>pe2ieirv2qazlmmuokkuozr10cqo4y0</sha1>
    </revision>
    <revision>
      <id>82466</id>
      <parentid>82035</parentid>
      <timestamp>2022-03-09T17:11:22Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Introduction */</comment>
      <origin>82466</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11646" sha1="h2d5lmbuj4baejcip1l4owd809bs9f6" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete operating system with [https://www.whonix.org/#features advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name_long}} is divided into two VMs: {{project_name_workstation_long}} for work activities and {{project_name_gateway_long}} to enforce routing all Internet traffic through the Tor network. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}
= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name_long}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>h2d5lmbuj4baejcip1l4owd809bs9f6</sha1>
    </revision>
    <revision>
      <id>82467</id>
      <parentid>82466</parentid>
      <timestamp>2022-03-09T17:12:44Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Introduction */</comment>
      <origin>82467</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11658" sha1="eep49brt51v3ho2cl90xbsc6dbrrp6t" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete operating system with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name_long}} is divided into two VMs: {{project_name_workstation_long}} for work activities and {{project_name_gateway_long}} to enforce routing all Internet traffic through the Tor network. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}
= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name_long}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>eep49brt51v3ho2cl90xbsc6dbrrp6t</sha1>
    </revision>
    <revision>
      <id>82468</id>
      <parentid>82467</parentid>
      <timestamp>2022-03-09T17:14:21Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Introduction */</comment>
      <origin>82468</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11729" sha1="n8w2zzf5ga98zknp2tkvtgbwi7n6yl0" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete operating system with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]]. (([[Host_Operating_System_Selection|Host Operating System Selection]])

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name_long}} is divided into two VMs: {{project_name_workstation_long}} for work activities and {{project_name_gateway_long}} to enforce routing all Internet traffic through the Tor network. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}
= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name_long}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>n8w2zzf5ga98zknp2tkvtgbwi7n6yl0</sha1>
    </revision>
    <revision>
      <id>82469</id>
      <parentid>82468</parentid>
      <timestamp>2022-03-09T17:14:37Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>82469</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11728" sha1="1fvict8uxh4fclj7wdge6qyjchybukb" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete operating system with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a host operating system (OS). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]]. ([[Host_Operating_System_Selection|Host Operating System Selection]])

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name_long}} is divided into two VMs: {{project_name_workstation_long}} for work activities and {{project_name_gateway_long}} to enforce routing all Internet traffic through the Tor network. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}
= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name_long}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>1fvict8uxh4fclj7wdge6qyjchybukb</sha1>
    </revision>
    <revision>
      <id>82470</id>
      <parentid>82469</parentid>
      <timestamp>2022-03-09T17:17:39Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Introduction */</comment>
      <origin>82470</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11753" sha1="myhl62bsvugwj7u54l3x69m1ha9xb9a" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]]. 

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name_long}} is divided into two VMs: {{project_name_workstation_long}} for work activities and {{project_name_gateway_long}} to enforce routing all Internet traffic through the Tor network. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}
= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name_long}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>myhl62bsvugwj7u54l3x69m1ha9xb9a</sha1>
    </revision>
    <revision>
      <id>82471</id>
      <parentid>82470</parentid>
      <timestamp>2022-03-09T17:19:14Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Support Schedule */</comment>
      <origin>82471</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="9007" sha1="ceqpx0h940hbl76wo9wzlizaycplpvi" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]]. 

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name_long}} is divided into two VMs: {{project_name_workstation_long}} for work activities and {{project_name_gateway_long}} to enforce routing all Internet traffic through the Tor network. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}
= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution
|}

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name_long}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>ceqpx0h940hbl76wo9wzlizaycplpvi</sha1>
    </revision>
    <revision>
      <id>82472</id>
      <parentid>82471</parentid>
      <timestamp>2022-03-09T17:19:30Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Summary */</comment>
      <origin>82472</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="11753" sha1="48eysgc1watu6pae1f8h631crdyr8fm" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]]. 

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name_long}} is divided into two VMs: {{project_name_workstation_long}} for work activities and {{project_name_gateway_long}} to enforce routing all Internet traffic through the Tor network. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}
= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent ISP spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution
|}

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name_long}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>48eysgc1watu6pae1f8h631crdyr8fm</sha1>
    </revision>
    <revision>
      <id>82473</id>
      <parentid>82472</parentid>
      <timestamp>2022-03-09T17:23:01Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Summary */</comment>
      <origin>82473</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="12072" sha1="kupgij8umkdkjt06s8z7mchnka695o9" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]]. 

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name_long}} is divided into two VMs: {{project_name_workstation_long}} for work activities and {{project_name_gateway_long}} to enforce routing all Internet traffic through the Tor network. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}
= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution. Such one-click anonymization solutions not only &lt;u&gt;do not exist&lt;/u&gt; but very most likely also &lt;u&gt;cannot exist&lt;/u&gt; since online anonymity is a complex challenge in a highly surveilled world as readers of [[Documentation|{{project name long}} documentation]] will learn.
|}

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name_long}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>kupgij8umkdkjt06s8z7mchnka695o9</sha1>
    </revision>
    <revision>
      <id>82474</id>
      <parentid>82473</parentid>
      <timestamp>2022-03-09T17:28:37Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Footnotes */</comment>
      <origin>82474</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="12195" sha1="pfcw5lxj4zoy3w0w3zmh8jrt5mutwa2" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]]. 

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name_long}} is divided into two VMs: {{project_name_workstation_long}} for work activities and {{project_name_gateway_long}} to enforce routing all Internet traffic through the Tor network. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}
= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution. Such one-click anonymization solutions not only &lt;u&gt;do not exist&lt;/u&gt; but very most likely also &lt;u&gt;cannot exist&lt;/u&gt; since online anonymity is a complex challenge in a highly surveilled world as readers of [[Documentation|{{project name long}} documentation]] will learn.
|}

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* The Security Guide, Advanced Security Guide and [[Design]] chapters detailing the {{project_name_long}} specifications, threat model and implementation.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>pfcw5lxj4zoy3w0w3zmh8jrt5mutwa2</sha1>
    </revision>
    <revision>
      <id>82475</id>
      <parentid>82474</parentid>
      <timestamp>2022-03-09T17:30:18Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Next Steps */</comment>
      <origin>82475</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="12040" sha1="bqi5w4n3p8azfcn2zp3c45gbqynjcj3" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]]. 

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =

{{project_name_long}} is divided into two VMs: {{project_name_workstation_long}} for work activities and {{project_name_gateway_long}} to enforce routing all Internet traffic through the Tor network. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; This security by isolation configuration averts many threats posed by malware, misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''
{{Box|text=
[[File:{{project_name_short}} concept refined.jpg]]
}}

= Online Anonymity via Tor =

{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}
= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution. Such one-click anonymization solutions not only &lt;u&gt;do not exist&lt;/u&gt; but very most likely also &lt;u&gt;cannot exist&lt;/u&gt; since online anonymity is a complex challenge in a highly surveilled world as readers of [[Documentation|{{project name long}} documentation]] will learn.
|}

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>bqi5w4n3p8azfcn2zp3c45gbqynjcj3</sha1>
    </revision>
    <revision>
      <id>82476</id>
      <parentid>82475</parentid>
      <timestamp>2022-03-09T17:58:43Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Security by Isolation */</comment>
      <origin>82476</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="13710" sha1="92kfudwyz5t1b3h7ccwhng1w7n69u4z" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]]. 

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. What is a leak? In laymen's terms, a leak happens if a user expected to be using Tor but got betrayed by parts of the application traffic actually not using Tor but the normal internet (clearnet) instead. One leak just once is all that is required to de-anonymize the user. For example IP leaks, DNS leaks, UDP and other leaks.

Even if Tor can provide sufficient anonymity, it is [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated to impossible] for users to configure applications to consistently and always make use of Tor for all traffic originating the application. That is because networking is very complex and most applications are not designed with anonymity or privacy in mind.

With {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible, and even malware with root privileges cannot discover the user's real IP address. That is because {{project_name_long}} makes sure that all internet traffic is routed through Tor thanks to its split-VM design.

Some applications such as most notably for example the Tor Browser Bundle are specifically designed for anonymity, privacy and to avoid leaks but despite all efforts due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]], leaks have occurred in the past. In such cases, users of {{project name long}} where protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs: {{project_name_workstation_long}} for work activities and {{project_name_gateway_long}} to enforce routing all Internet traffic through the Tor network. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}} concept refined.jpg]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

= Online Anonymity via Tor =

{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}
= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution. Such one-click anonymization solutions not only &lt;u&gt;do not exist&lt;/u&gt; but very most likely also &lt;u&gt;cannot exist&lt;/u&gt; since online anonymity is a complex challenge in a highly surveilled world as readers of [[Documentation|{{project name long}} documentation]] will learn.
|}

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>92kfudwyz5t1b3h7ccwhng1w7n69u4z</sha1>
    </revision>
    <revision>
      <id>82477</id>
      <parentid>82476</parentid>
      <timestamp>2022-03-09T18:02:11Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Security by Isolation */</comment>
      <origin>82477</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="13791" sha1="np60expz15wcm9m9bxfoba690yy7k60" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]]. 

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. What is a leak? In laymen's terms, a leak happens if a user expected to be using Tor but got betrayed by parts of the application traffic actually not using Tor but the normal internet (clearnet) instead. One leak just once is all that is required to de-anonymize the user. For example IP leaks, DNS leaks, UDP and other leaks.

Even if Tor can provide sufficient anonymity, it is [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated to impossible] for users to configure applications to consistently and always make use of Tor for all traffic originating the application. That is because networking is very complex and most applications are not designed with anonymity or privacy in mind.

With {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible, and even malware with root privileges cannot discover the user's real IP address. That is because {{project_name_long}} makes sure that all internet traffic is routed through Tor thanks to its split-VM design.

Some applications such as most notably for example the Tor Browser Bundle are specifically designed for anonymity, privacy and to avoid leaks but despite all efforts due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]], leaks have occurred in the past. In such cases, users of {{project name long}} where protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities, and
* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing all Internet traffic through the Tor network. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt;

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}} concept refined.jpg]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

= Online Anonymity via Tor =

{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}
= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution. Such one-click anonymization solutions not only &lt;u&gt;do not exist&lt;/u&gt; but very most likely also &lt;u&gt;cannot exist&lt;/u&gt; since online anonymity is a complex challenge in a highly surveilled world as readers of [[Documentation|{{project name long}} documentation]] will learn.
|}

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>np60expz15wcm9m9bxfoba690yy7k60</sha1>
    </revision>
    <revision>
      <id>82478</id>
      <parentid>82477</parentid>
      <timestamp>2022-03-09T18:03:13Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Security by Isolation */</comment>
      <origin>82478</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="13790" sha1="e0p4p6wuy9662hyo5s0dyf620489ulv" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]]. 

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. What is a leak? In laymen's terms, a leak happens if a user expected to be using Tor but got betrayed by parts of the application traffic actually not using Tor but the normal internet (clearnet) instead. One leak just once is all that is required to de-anonymize the user. For example IP leaks, DNS leaks, UDP and other leaks.

Even if Tor can provide sufficient anonymity, it is [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated to impossible] for users to configure applications to consistently and always make use of Tor for all traffic originating the application. That is because networking is very complex and most applications are not designed with anonymity or privacy in mind.

With {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible, and even malware with root privileges cannot discover the user's real IP address. That is because {{project_name_long}} makes sure that all internet traffic is routed through Tor thanks to its split-VM design.

Some applications such as most notably for example the Tor Browser Bundle are specifically designed for anonymity, privacy and to avoid leaks but despite all efforts due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]], leaks have occurred in the past. In such cases, users of {{project name long}} were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities, and
* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing all Internet traffic through the Tor network. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt;

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}} concept refined.jpg]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

= Online Anonymity via Tor =

{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}
= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution. Such one-click anonymization solutions not only &lt;u&gt;do not exist&lt;/u&gt; but very most likely also &lt;u&gt;cannot exist&lt;/u&gt; since online anonymity is a complex challenge in a highly surveilled world as readers of [[Documentation|{{project name long}} documentation]] will learn.
|}

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>e0p4p6wuy9662hyo5s0dyf620489ulv</sha1>
    </revision>
    <revision>
      <id>82479</id>
      <parentid>82478</parentid>
      <timestamp>2022-03-09T18:05:08Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Security by Isolation */</comment>
      <origin>82479</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="13600" sha1="m7z98ixjkkvehz0isq38yr9gsv2z0e7" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]]. 

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. What is a leak? In laymen's terms, a leak happens if a user expected to be using Tor but got betrayed by parts of the application traffic actually not using Tor but the normal internet (clearnet) instead. One leak just once is all that is required to de-anonymize the user. For example IP leaks, DNS leaks, UDP and other leaks.

Even if Tor can provide sufficient anonymity, it is [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated to impossible] for users to configure applications to consistently and always make use of Tor for all traffic originating the application. That is because networking is very complex and most applications are not designed with anonymity or privacy in mind.

With {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible, and even malware with root privileges cannot discover the user's real IP address. That is because {{project_name_long}} makes sure that all internet traffic is routed through Tor thanks to its split-VM design.

Some applications such as most notably for example the Tor Browser Bundle are specifically designed for anonymity, privacy and to avoid leaks but despite all efforts due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]], leaks have occurred in the past. In such cases, users of {{project name long}} were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}} concept refined.jpg]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

= Online Anonymity via Tor =

{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}
= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution. Such one-click anonymization solutions not only &lt;u&gt;do not exist&lt;/u&gt; but very most likely also &lt;u&gt;cannot exist&lt;/u&gt; since online anonymity is a complex challenge in a highly surveilled world as readers of [[Documentation|{{project name long}} documentation]] will learn.
|}

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>m7z98ixjkkvehz0isq38yr9gsv2z0e7</sha1>
    </revision>
    <revision>
      <id>82480</id>
      <parentid>82479</parentid>
      <timestamp>2022-03-09T18:07:32Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Security by Isolation */</comment>
      <origin>82480</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="13772" sha1="2av3d4p1w3obeiiv72oec775ke4m4b2" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]]. 

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. What is a leak? In laymen's terms, a leak happens if a user expected to be using Tor but got betrayed by parts of the application traffic actually not using Tor but the normal internet (clearnet) instead. One leak just once is all that is required to de-anonymize the user. For example IP leaks, DNS leaks, UDP and other leaks.

Even if Tor can provide sufficient anonymity, it is [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated to impossible] for users to configure applications to consistently and always make use of Tor for all traffic originating the application. That is because networking is very complex and most applications are not designed with anonymity or privacy in mind.

With {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible, and even malware with root privileges cannot discover the user's real IP address. That is because {{project_name_long}} makes sure that all internet traffic is routed through Tor thanks to its split-VM design.

Some applications such as most notably for example the Tor Browser Bundle are specifically designed for anonymity, privacy and to avoid leaks but despite all efforts due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]], leaks have occurred in the past. In such cases, users of {{project name long}} were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address. That is why the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}} concept refined.jpg]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

= Online Anonymity via Tor =

{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}
= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution. Such one-click anonymization solutions not only &lt;u&gt;do not exist&lt;/u&gt; but very most likely also &lt;u&gt;cannot exist&lt;/u&gt; since online anonymity is a complex challenge in a highly surveilled world as readers of [[Documentation|{{project name long}} documentation]] will learn.
|}

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>2av3d4p1w3obeiiv72oec775ke4m4b2</sha1>
    </revision>
    <revision>
      <id>82482</id>
      <parentid>82480</parentid>
      <timestamp>2022-03-09T18:11:34Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Security by Isolation */</comment>
      <origin>82482</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="13896" sha1="n601pz6qjoctuo8dv5ko2tlogadqti2" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]]. 

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. What is a leak? In laymen's terms, a leak happens if a user expected to be using Tor but got betrayed by parts of the application traffic actually not using Tor but the normal internet (clearnet) instead. One leak just once is all that is required to de-anonymize the user. For example IP leaks, DNS leaks, UDP and other leaks.

Even if Tor can provide sufficient anonymity, it is [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated to impossible] for users to configure applications to consistently and always make use of Tor for all traffic originating the application. That is because networking is very complex and most applications are not designed with anonymity or privacy in mind.

With {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible, and even malware with root privileges cannot discover the user's real IP address. That is because {{project_name_long}} makes sure that all internet traffic is routed through Tor thanks to its split-VM design.

Some applications such as most notably for example the Tor Browser Bundle are specifically designed for anonymity, privacy and to avoid leaks but despite all efforts due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]], leaks have occurred in the past. In such cases, users of {{project name long}} were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address. That is why the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}} concept refined.jpg]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This has been audited through the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]].

= Online Anonymity via Tor =

{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}
= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution. Such one-click anonymization solutions not only &lt;u&gt;do not exist&lt;/u&gt; but very most likely also &lt;u&gt;cannot exist&lt;/u&gt; since online anonymity is a complex challenge in a highly surveilled world as readers of [[Documentation|{{project name long}} documentation]] will learn.
|}

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>n601pz6qjoctuo8dv5ko2tlogadqti2</sha1>
    </revision>
    <revision>
      <id>82483</id>
      <parentid>82482</parentid>
      <timestamp>2022-03-09T18:13:02Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Security by Isolation */</comment>
      <origin>82483</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="13992" sha1="kc08q6o0vem03wpovv56ity94xxxrrq" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]]. 

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. What is a leak? In laymen's terms, a leak happens if a user expected to be using Tor but got betrayed by parts of the application traffic actually not using Tor but the normal internet (clearnet) instead. One leak just once is all that is required to de-anonymize the user. For example IP leaks, DNS leaks, UDP and other leaks.

Even if Tor can provide sufficient anonymity, it is [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated to impossible] for users to configure applications to consistently and always make use of Tor for all traffic originating the application. That is because networking is very complex and most applications are not designed with anonymity or privacy in mind.

With {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible, and even malware with root privileges cannot discover the user's real IP address. That is because {{project_name_long}} makes sure that all internet traffic is routed through Tor thanks to its split-VM design.

Some applications such as most notably for example the Tor Browser Bundle are specifically designed for anonymity, privacy and to avoid leaks but despite all efforts due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]], leaks have occurred in the past. In such cases, users of {{project name long}} were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address. That is why the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}} concept refined.jpg]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This has been audited through the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. No leaks have ever been found in {{project name long}} during its [[History|10 years history]].

= Online Anonymity via Tor =

{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}
= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution. Such one-click anonymization solutions not only &lt;u&gt;do not exist&lt;/u&gt; but very most likely also &lt;u&gt;cannot exist&lt;/u&gt; since online anonymity is a complex challenge in a highly surveilled world as readers of [[Documentation|{{project name long}} documentation]] will learn.
|}

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>kc08q6o0vem03wpovv56ity94xxxrrq</sha1>
    </revision>
    <revision>
      <id>82484</id>
      <parentid>82483</parentid>
      <timestamp>2022-03-09T18:16:01Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Security by Isolation */</comment>
      <origin>82484</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="14202" sha1="otol1ez5dzzf5mrscoxqesgi6wa6un3" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]]. 

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. What is a leak? In laymen's terms, a leak happens if a user expected to be using Tor but got betrayed by parts of the application traffic actually not using Tor but the normal internet (clearnet) instead. One leak just once is all that is required to de-anonymize the user. For example IP leaks, DNS leaks, UDP and other leaks.

Even if Tor can provide sufficient anonymity, it is [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated to impossible] for users to configure applications to consistently and always make use of Tor for all traffic originating the application. That is because networking is very complex and most applications are not designed with anonymity or privacy in mind.

With {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible, and even malware with root privileges cannot discover the user's real IP address. That is because {{project_name_long}} makes sure that all internet traffic is routed through Tor thanks to its split-VM design.

Some applications such as most notably for example the Tor Browser Bundle are specifically designed for anonymity, privacy and to avoid leaks but despite all efforts due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]], leaks have occurred in the past. In such cases, users of {{project name long}} were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address. That is why the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}} concept refined.jpg]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This has been audited through the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. No leaks have ever been found in {{project name long}} during its [[History|10 years history]].

For technical readers this is being further substantiated in [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]].

= Online Anonymity via Tor =

{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}
= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution. Such one-click anonymization solutions not only &lt;u&gt;do not exist&lt;/u&gt; but very most likely also &lt;u&gt;cannot exist&lt;/u&gt; since online anonymity is a complex challenge in a highly surveilled world as readers of [[Documentation|{{project name long}} documentation]] will learn.
|}

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>otol1ez5dzzf5mrscoxqesgi6wa6un3</sha1>
    </revision>
    <revision>
      <id>82856</id>
      <parentid>82484</parentid>
      <timestamp>2022-03-18T12:20:02Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Security by Isolation */</comment>
      <origin>82856</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="14209" sha1="5812jfbdn8m9lj2p2sle9ysc5c12u49" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]]. 

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on [[Kicksecure]] ™ (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. What is a leak? In laymen's terms, a leak happens if a user expected to be using Tor but got betrayed by parts of the application traffic actually not using Tor but the normal internet (clearnet) instead. One leak just once is all that is required to de-anonymize the user. For example IP leaks, DNS leaks, UDP and other leaks.

Even if Tor can provide sufficient anonymity, it is [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated to impossible] for users to configure applications to consistently and always make use of Tor for all traffic originating the application. That is because networking is very complex and most applications are not designed with anonymity or privacy in mind.

With {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible, and even malware with root privileges cannot discover the user's real IP address. That is because {{project_name_long}} makes sure that all internet traffic is routed through Tor thanks to its split-VM design.

Some applications such as most notably for example the Tor Browser Bundle are specifically designed for anonymity, privacy and to avoid leaks but despite all efforts due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]], leaks have occurred in the past. In such cases, users of {{project name long}} were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address. That is why the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This has been audited through the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. No leaks have ever been found in {{project name long}} during its [[History|10 years history]].

For technical readers this is being further substantiated in [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]].

= Online Anonymity via Tor =

{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}
= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution. Such one-click anonymization solutions not only &lt;u&gt;do not exist&lt;/u&gt; but very most likely also &lt;u&gt;cannot exist&lt;/u&gt; since online anonymity is a complex challenge in a highly surveilled world as readers of [[Documentation|{{project name long}} documentation]] will learn.
|}

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>5812jfbdn8m9lj2p2sle9ysc5c12u49</sha1>
    </revision>
    <revision>
      <id>82964</id>
      <parentid>82856</parentid>
      <timestamp>2022-03-23T08:57:24Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Introduction */</comment>
      <origin>82964</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="14229" sha1="aqedz59bwa44sx1s81qvyi6ixemcnaq" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]]. 

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. What is a leak? In laymen's terms, a leak happens if a user expected to be using Tor but got betrayed by parts of the application traffic actually not using Tor but the normal internet (clearnet) instead. One leak just once is all that is required to de-anonymize the user. For example IP leaks, DNS leaks, UDP and other leaks.

Even if Tor can provide sufficient anonymity, it is [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated to impossible] for users to configure applications to consistently and always make use of Tor for all traffic originating the application. That is because networking is very complex and most applications are not designed with anonymity or privacy in mind.

With {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible, and even malware with root privileges cannot discover the user's real IP address. That is because {{project_name_long}} makes sure that all internet traffic is routed through Tor thanks to its split-VM design.

Some applications such as most notably for example the Tor Browser Bundle are specifically designed for anonymity, privacy and to avoid leaks but despite all efforts due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]], leaks have occurred in the past. In such cases, users of {{project name long}} were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address. That is why the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This has been audited through the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. No leaks have ever been found in {{project name long}} during its [[History|10 years history]].

For technical readers this is being further substantiated in [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]].

= Online Anonymity via Tor =

{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}
= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution. Such one-click anonymization solutions not only &lt;u&gt;do not exist&lt;/u&gt; but very most likely also &lt;u&gt;cannot exist&lt;/u&gt; since online anonymity is a complex challenge in a highly surveilled world as readers of [[Documentation|{{project name long}} documentation]] will learn.
|}

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>aqedz59bwa44sx1s81qvyi6ixemcnaq</sha1>
    </revision>
    <revision>
      <id>83530</id>
      <parentid>82964</parentid>
      <timestamp>2022-06-05T13:31:50Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "{{project_name_short}}/{{project_name_short}}/blob/master/GPLv3" to "derivative-maker/derivative-maker/blob/master/GPLv3"</comment>
      <origin>83530</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="14217" sha1="ir2kpcz1kgx4lzs169nkrs8oyegx2zd" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/derivative-maker/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;http://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]]. 

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. What is a leak? In laymen's terms, a leak happens if a user expected to be using Tor but got betrayed by parts of the application traffic actually not using Tor but the normal internet (clearnet) instead. One leak just once is all that is required to de-anonymize the user. For example IP leaks, DNS leaks, UDP and other leaks.

Even if Tor can provide sufficient anonymity, it is [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated to impossible] for users to configure applications to consistently and always make use of Tor for all traffic originating the application. That is because networking is very complex and most applications are not designed with anonymity or privacy in mind.

With {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible, and even malware with root privileges cannot discover the user's real IP address. That is because {{project_name_long}} makes sure that all internet traffic is routed through Tor thanks to its split-VM design.

Some applications such as most notably for example the Tor Browser Bundle are specifically designed for anonymity, privacy and to avoid leaks but despite all efforts due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]], leaks have occurred in the past. In such cases, users of {{project name long}} were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address. That is why the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This has been audited through the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. No leaks have ever been found in {{project name long}} during its [[History|10 years history]].

For technical readers this is being further substantiated in [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]].

= Online Anonymity via Tor =

{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}
= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution. Such one-click anonymization solutions not only &lt;u&gt;do not exist&lt;/u&gt; but very most likely also &lt;u&gt;cannot exist&lt;/u&gt; since online anonymity is a complex challenge in a highly surveilled world as readers of [[Documentation|{{project name long}} documentation]] will learn.
|}

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>ir2kpcz1kgx4lzs169nkrs8oyegx2zd</sha1>
    </revision>
    <revision>
      <id>84119</id>
      <parentid>83530</parentid>
      <timestamp>2022-07-14T09:53:40Z</timestamp>
      <contributor>
        <username>Wiki-import</username>
        <id>5022</id>
      </contributor>
      <origin>84119</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="14218" sha1="j9tmc8ucijeeq9t9cyw2orangtxnl2u" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/derivative-maker/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]]. 

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. What is a leak? In laymen's terms, a leak happens if a user expected to be using Tor but got betrayed by parts of the application traffic actually not using Tor but the normal internet (clearnet) instead. One leak just once is all that is required to de-anonymize the user. For example IP leaks, DNS leaks, UDP and other leaks.

Even if Tor can provide sufficient anonymity, it is [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated to impossible] for users to configure applications to consistently and always make use of Tor for all traffic originating the application. That is because networking is very complex and most applications are not designed with anonymity or privacy in mind.

With {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible, and even malware with root privileges cannot discover the user's real IP address. That is because {{project_name_long}} makes sure that all internet traffic is routed through Tor thanks to its split-VM design.

Some applications such as most notably for example the Tor Browser Bundle are specifically designed for anonymity, privacy and to avoid leaks but despite all efforts due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]], leaks have occurred in the past. In such cases, users of {{project name long}} were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address. That is why the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This has been audited through the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. No leaks have ever been found in {{project name long}} during its [[History|10 years history]].

For technical readers this is being further substantiated in [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]].

= Online Anonymity via Tor =

{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}
= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution. Such one-click anonymization solutions not only &lt;u&gt;do not exist&lt;/u&gt; but very most likely also &lt;u&gt;cannot exist&lt;/u&gt; since online anonymity is a complex challenge in a highly surveilled world as readers of [[Documentation|{{project name long}} documentation]] will learn.
|}

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>j9tmc8ucijeeq9t9cyw2orangtxnl2u</sha1>
    </revision>
    <revision>
      <id>84556</id>
      <parentid>84119</parentid>
      <timestamp>2022-07-25T21:26:21Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Introduction */</comment>
      <origin>84556</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="14356" sha1="9tno6tzh265tpwsheg5p1hzphlbx67e" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/derivative-maker/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
[[File:Kicksecure-seal.png|thumb|100px|Kicksecure logo]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|Tor logo]]
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]]. 

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. What is a leak? In laymen's terms, a leak happens if a user expected to be using Tor but got betrayed by parts of the application traffic actually not using Tor but the normal internet (clearnet) instead. One leak just once is all that is required to de-anonymize the user. For example IP leaks, DNS leaks, UDP and other leaks.

Even if Tor can provide sufficient anonymity, it is [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated to impossible] for users to configure applications to consistently and always make use of Tor for all traffic originating the application. That is because networking is very complex and most applications are not designed with anonymity or privacy in mind.

With {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible, and even malware with root privileges cannot discover the user's real IP address. That is because {{project_name_long}} makes sure that all internet traffic is routed through Tor thanks to its split-VM design.

Some applications such as most notably for example the Tor Browser Bundle are specifically designed for anonymity, privacy and to avoid leaks but despite all efforts due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]], leaks have occurred in the past. In such cases, users of {{project name long}} were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address. That is why the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This has been audited through the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. No leaks have ever been found in {{project name long}} during its [[History|10 years history]].

For technical readers this is being further substantiated in [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]].

= Online Anonymity via Tor =

{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}
= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution. Such one-click anonymization solutions not only &lt;u&gt;do not exist&lt;/u&gt; but very most likely also &lt;u&gt;cannot exist&lt;/u&gt; since online anonymity is a complex challenge in a highly surveilled world as readers of [[Documentation|{{project name long}} documentation]] will learn.
|}

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>9tno6tzh265tpwsheg5p1hzphlbx67e</sha1>
    </revision>
    <revision>
      <id>84557</id>
      <parentid>84556</parentid>
      <timestamp>2022-07-25T21:26:45Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Introduction */</comment>
      <origin>84557</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="14362" sha1="mt8ww7os0yekm8gnwlclankeq17vfo1" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/derivative-maker/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
[[File:Kicksecure-seal.png|thumb|100px|Kicksecure logo]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]]. 

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. What is a leak? In laymen's terms, a leak happens if a user expected to be using Tor but got betrayed by parts of the application traffic actually not using Tor but the normal internet (clearnet) instead. One leak just once is all that is required to de-anonymize the user. For example IP leaks, DNS leaks, UDP and other leaks.

Even if Tor can provide sufficient anonymity, it is [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated to impossible] for users to configure applications to consistently and always make use of Tor for all traffic originating the application. That is because networking is very complex and most applications are not designed with anonymity or privacy in mind.

With {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible, and even malware with root privileges cannot discover the user's real IP address. That is because {{project_name_long}} makes sure that all internet traffic is routed through Tor thanks to its split-VM design.

Some applications such as most notably for example the Tor Browser Bundle are specifically designed for anonymity, privacy and to avoid leaks but despite all efforts due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]], leaks have occurred in the past. In such cases, users of {{project name long}} were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address. That is why the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This has been audited through the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. No leaks have ever been found in {{project name long}} during its [[History|10 years history]].

For technical readers this is being further substantiated in [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]].

= Online Anonymity via Tor =

{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}
= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution. Such one-click anonymization solutions not only &lt;u&gt;do not exist&lt;/u&gt; but very most likely also &lt;u&gt;cannot exist&lt;/u&gt; since online anonymity is a complex challenge in a highly surveilled world as readers of [[Documentation|{{project name long}} documentation]] will learn.
|}

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>mt8ww7os0yekm8gnwlclankeq17vfo1</sha1>
    </revision>
    <revision>
      <id>84558</id>
      <parentid>84557</parentid>
      <timestamp>2022-07-25T21:27:28Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Introduction */</comment>
      <origin>84558</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="14346" sha1="bg2q2s6kajrpw8ukkye4chnmd8c5cco" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/derivative-maker/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]]. 

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. What is a leak? In laymen's terms, a leak happens if a user expected to be using Tor but got betrayed by parts of the application traffic actually not using Tor but the normal internet (clearnet) instead. One leak just once is all that is required to de-anonymize the user. For example IP leaks, DNS leaks, UDP and other leaks.

Even if Tor can provide sufficient anonymity, it is [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated to impossible] for users to configure applications to consistently and always make use of Tor for all traffic originating the application. That is because networking is very complex and most applications are not designed with anonymity or privacy in mind.

With {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible, and even malware with root privileges cannot discover the user's real IP address. That is because {{project_name_long}} makes sure that all internet traffic is routed through Tor thanks to its split-VM design.

Some applications such as most notably for example the Tor Browser Bundle are specifically designed for anonymity, privacy and to avoid leaks but despite all efforts due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]], leaks have occurred in the past. In such cases, users of {{project name long}} were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address. That is why the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This has been audited through the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. No leaks have ever been found in {{project name long}} during its [[History|10 years history]].

For technical readers this is being further substantiated in [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]].

= Online Anonymity via Tor =

{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}
= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution. Such one-click anonymization solutions not only &lt;u&gt;do not exist&lt;/u&gt; but very most likely also &lt;u&gt;cannot exist&lt;/u&gt; since online anonymity is a complex challenge in a highly surveilled world as readers of [[Documentation|{{project name long}} documentation]] will learn.
|}

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>bg2q2s6kajrpw8ukkye4chnmd8c5cco</sha1>
    </revision>
    <revision>
      <id>84569</id>
      <parentid>84558</parentid>
      <timestamp>2022-07-25T21:41:35Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Based on Debian */</comment>
      <origin>84569</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="14391" sha1="bkrfw5s23vinb51l82vo9uigatimg68" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/derivative-maker/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]]. 

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. What is a leak? In laymen's terms, a leak happens if a user expected to be using Tor but got betrayed by parts of the application traffic actually not using Tor but the normal internet (clearnet) instead. One leak just once is all that is required to de-anonymize the user. For example IP leaks, DNS leaks, UDP and other leaks.

Even if Tor can provide sufficient anonymity, it is [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated to impossible] for users to configure applications to consistently and always make use of Tor for all traffic originating the application. That is because networking is very complex and most applications are not designed with anonymity or privacy in mind.

With {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible, and even malware with root privileges cannot discover the user's real IP address. That is because {{project_name_long}} makes sure that all internet traffic is routed through Tor thanks to its split-VM design.

Some applications such as most notably for example the Tor Browser Bundle are specifically designed for anonymity, privacy and to avoid leaks but despite all efforts due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]], leaks have occurred in the past. In such cases, users of {{project name long}} were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address. That is why the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This has been audited through the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. No leaks have ever been found in {{project name long}} during its [[History|10 years history]].

For technical readers this is being further substantiated in [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]].

= Online Anonymity via Tor =

{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution. Such one-click anonymization solutions not only &lt;u&gt;do not exist&lt;/u&gt; but very most likely also &lt;u&gt;cannot exist&lt;/u&gt; since online anonymity is a complex challenge in a highly surveilled world as readers of [[Documentation|{{project name long}} documentation]] will learn.
|}

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>bkrfw5s23vinb51l82vo9uigatimg68</sha1>
    </revision>
    <revision>
      <id>84570</id>
      <parentid>84569</parentid>
      <timestamp>2022-07-25T21:42:26Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Online Anonymity via Tor */</comment>
      <origin>84570</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="14433" sha1="70eu7w0r1zdnmsu4daek0ujgy3eyhn1" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/derivative-maker/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]]. 

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. What is a leak? In laymen's terms, a leak happens if a user expected to be using Tor but got betrayed by parts of the application traffic actually not using Tor but the normal internet (clearnet) instead. One leak just once is all that is required to de-anonymize the user. For example IP leaks, DNS leaks, UDP and other leaks.

Even if Tor can provide sufficient anonymity, it is [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated to impossible] for users to configure applications to consistently and always make use of Tor for all traffic originating the application. That is because networking is very complex and most applications are not designed with anonymity or privacy in mind.

With {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible, and even malware with root privileges cannot discover the user's real IP address. That is because {{project_name_long}} makes sure that all internet traffic is routed through Tor thanks to its split-VM design.

Some applications such as most notably for example the Tor Browser Bundle are specifically designed for anonymity, privacy and to avoid leaks but despite all efforts due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]], leaks have occurred in the past. In such cases, users of {{project name long}} were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address. That is why the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This has been audited through the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. No leaks have ever been found in {{project name long}} during its [[History|10 years history]].

For technical readers this is being further substantiated in [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]].

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution. Such one-click anonymization solutions not only &lt;u&gt;do not exist&lt;/u&gt; but very most likely also &lt;u&gt;cannot exist&lt;/u&gt; since online anonymity is a complex challenge in a highly surveilled world as readers of [[Documentation|{{project name long}} documentation]] will learn.
|}

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>70eu7w0r1zdnmsu4daek0ujgy3eyhn1</sha1>
    </revision>
    <revision>
      <id>84571</id>
      <parentid>84570</parentid>
      <timestamp>2022-07-25T21:46:23Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* {{project_name_short}} Version */</comment>
      <origin>84571</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="14532" sha1="oahyfsjcdfqyx81r8ob9k3o9wtrjugf" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/derivative-maker/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]]. 

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. What is a leak? In laymen's terms, a leak happens if a user expected to be using Tor but got betrayed by parts of the application traffic actually not using Tor but the normal internet (clearnet) instead. One leak just once is all that is required to de-anonymize the user. For example IP leaks, DNS leaks, UDP and other leaks.

Even if Tor can provide sufficient anonymity, it is [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated to impossible] for users to configure applications to consistently and always make use of Tor for all traffic originating the application. That is because networking is very complex and most applications are not designed with anonymity or privacy in mind.

With {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible, and even malware with root privileges cannot discover the user's real IP address. That is because {{project_name_long}} makes sure that all internet traffic is routed through Tor thanks to its split-VM design.

Some applications such as most notably for example the Tor Browser Bundle are specifically designed for anonymity, privacy and to avoid leaks but despite all efforts due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]], leaks have occurred in the past. In such cases, users of {{project name long}} were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address. That is why the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This has been audited through the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. No leaks have ever been found in {{project name long}} during its [[History|10 years history]].

For technical readers this is being further substantiated in [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]].

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution. Such one-click anonymization solutions not only &lt;u&gt;do not exist&lt;/u&gt; but very most likely also &lt;u&gt;cannot exist&lt;/u&gt; since online anonymity is a complex challenge in a highly surveilled world as readers of [[Documentation|{{project name long}} documentation]] will learn.
|}

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>oahyfsjcdfqyx81r8ob9k3o9wtrjugf</sha1>
    </revision>
    <revision>
      <id>84573</id>
      <parentid>84571</parentid>
      <timestamp>2022-07-25T21:48:25Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Introduction */</comment>
      <origin>84573</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="14631" sha1="q3akk61z8bqxdz8f9kk9c9ovz9qpaxz" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/derivative-maker/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]]. 

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. What is a leak? In laymen's terms, a leak happens if a user expected to be using Tor but got betrayed by parts of the application traffic actually not using Tor but the normal internet (clearnet) instead. One leak just once is all that is required to de-anonymize the user. For example IP leaks, DNS leaks, UDP and other leaks.

Even if Tor can provide sufficient anonymity, it is [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated to impossible] for users to configure applications to consistently and always make use of Tor for all traffic originating the application. That is because networking is very complex and most applications are not designed with anonymity or privacy in mind.

With {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible, and even malware with root privileges cannot discover the user's real IP address. That is because {{project_name_long}} makes sure that all internet traffic is routed through Tor thanks to its split-VM design.

Some applications such as most notably for example the Tor Browser Bundle are specifically designed for anonymity, privacy and to avoid leaks but despite all efforts due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]], leaks have occurred in the past. In such cases, users of {{project name long}} were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address. That is why the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This has been audited through the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. No leaks have ever been found in {{project name long}} during its [[History|10 years history]].

For technical readers this is being further substantiated in [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]].

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/blog/one-cell-enough If both flows are visible], simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution. Such one-click anonymization solutions not only &lt;u&gt;do not exist&lt;/u&gt; but very most likely also &lt;u&gt;cannot exist&lt;/u&gt; since online anonymity is a complex challenge in a highly surveilled world as readers of [[Documentation|{{project name long}} documentation]] will learn.
|}

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>q3akk61z8bqxdz8f9kk9c9ovz9qpaxz</sha1>
    </revision>
    <revision>
      <id>84694</id>
      <parentid>84573</parentid>
      <timestamp>2022-07-26T21:57:37Z</timestamp>
      <contributor>
        <username>Nurmagoz</username>
        <id>4391</id>
      </contributor>
      <origin>84694</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="14648" sha1="2sulys65s7jpkqegmyy65us930f1y9f" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/derivative-maker/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]]. 

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. What is a leak? In laymen's terms, a leak happens if a user expected to be using Tor but got betrayed by parts of the application traffic actually not using Tor but the normal internet (clearnet) instead. One leak just once is all that is required to de-anonymize the user. For example IP leaks, DNS leaks, UDP and other leaks.

Even if Tor can provide sufficient anonymity, it is [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated to impossible] for users to configure applications to consistently and always make use of Tor for all traffic originating the application. That is because networking is very complex and most applications are not designed with anonymity or privacy in mind.

With {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible, and even malware with root privileges cannot discover the user's real IP address. That is because {{project_name_long}} makes sure that all internet traffic is routed through Tor thanks to its split-VM design.

Some applications such as most notably for example the Tor Browser Bundle are specifically designed for anonymity, privacy and to avoid leaks but despite all efforts due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]], leaks have occurred in the past. In such cases, users of {{project name long}} were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address. That is why the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This has been audited through the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. No leaks have ever been found in {{project name long}} during its [[History|10 years history]].

For technical readers this is being further substantiated in [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]].

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If both flows are visible], simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the [https://www.torproject.org/ Tor website] ([http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html .onion]):

* [https://2019.www.torproject.org/about/overview.html.en#whyweneedtor Tor overview: Why we need Tor] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor .onion])
* [https://2019.www.torproject.org/about/overview.html.en#thesolution Tor overview: How Tor Works] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution .onion])
* [https://2019.www.torproject.org/about/torusers.html.en Who uses Tor?] ([http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en .onion])

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution. Such one-click anonymization solutions not only &lt;u&gt;do not exist&lt;/u&gt; but very most likely also &lt;u&gt;cannot exist&lt;/u&gt; since online anonymity is a complex challenge in a highly surveilled world as readers of [[Documentation|{{project name long}} documentation]] will learn.
|}

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>2sulys65s7jpkqegmyy65us930f1y9f</sha1>
    </revision>
    <revision>
      <id>85341</id>
      <parentid>84694</parentid>
      <timestamp>2022-08-05T23:00:15Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>use template instead for cleaner look</comment>
      <origin>85341</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="14896" sha1="rn4gntf5d0laig39idg934qra62ykzo" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/derivative-maker/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]]. 

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. What is a leak? In laymen's terms, a leak happens if a user expected to be using Tor but got betrayed by parts of the application traffic actually not using Tor but the normal internet (clearnet) instead. One leak just once is all that is required to de-anonymize the user. For example IP leaks, DNS leaks, UDP and other leaks.

Even if Tor can provide sufficient anonymity, it is [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated to impossible] for users to configure applications to consistently and always make use of Tor for all traffic originating the application. That is because networking is very complex and most applications are not designed with anonymity or privacy in mind.

With {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible, and even malware with root privileges cannot discover the user's real IP address. That is because {{project_name_long}} makes sure that all internet traffic is routed through Tor thanks to its split-VM design.

Some applications such as most notably for example the Tor Browser Bundle are specifically designed for anonymity, privacy and to avoid leaks but despite all efforts due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]], leaks have occurred in the past. In such cases, users of {{project name long}} were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address. That is why the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This has been audited through the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. No leaks have ever been found in {{project name long}} during its [[History|10 years history]].

For technical readers this is being further substantiated in [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]].

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ 
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/ 
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor 
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution 
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en 
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution. Such one-click anonymization solutions not only &lt;u&gt;do not exist&lt;/u&gt; but very most likely also &lt;u&gt;cannot exist&lt;/u&gt; since online anonymity is a complex challenge in a highly surveilled world as readers of [[Documentation|{{project name long}} documentation]] will learn.
|}

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>rn4gntf5d0laig39idg934qra62ykzo</sha1>
    </revision>
    <revision>
      <id>85342</id>
      <parentid>85341</parentid>
      <timestamp>2022-08-05T23:09:11Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>phrasing nit</comment>
      <origin>85342</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="14919" sha1="99tdwwfygw8a3hb8csgo88zyz57w6j4" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/derivative-maker/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]]. 

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. What is a leak? In laymen's terms, a leak happens if a user expected to be using Tor but got betrayed by parts of the application traffic actually not using Tor but the normal internet (clearnet) instead. One leak just once is all that is required to de-anonymize the user. For example IP leaks, DNS leaks, UDP and other leaks.

Even if Tor can provide sufficient anonymity, it is [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated to impossible] for users to configure applications to consistently and always make use of Tor for all traffic originating the application. That is because networking is very complex and most applications are not designed with anonymity or privacy in mind.

With {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible, and even malware with root privileges cannot discover the user's real IP address. That is because {{project_name_long}} makes sure that all internet traffic is routed through Tor thanks to its split-VM design.

Some applications such as most notably for example the Tor Browser Bundle are specifically designed for anonymity, privacy and to avoid leaks but despite all efforts due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]], leaks have occurred in the past. In such cases, users of {{project name long}} were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address. That is why the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This has been audited through the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. No leaks have ever been found in {{project name long}} during its [[History|10 years history]].

For technical readers this is being further substantiated in [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]].

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ 
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/ 
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor 
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution 
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en 
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.&lt;/ref&gt;
|}

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>99tdwwfygw8a3hb8csgo88zyz57w6j4</sha1>
    </revision>
    <revision>
      <id>85343</id>
      <parentid>85342</parentid>
      <timestamp>2022-08-05T23:39:39Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>phrasing, grammar nits</comment>
      <origin>85343</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="14853" sha1="e4xmgihq86olyg82c9vrhi9cqs8cxy4" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/derivative-maker/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]]. 

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]], and no leaks were ever discovered during the last [[History|ten years]].

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ 
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/ 
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor 
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution 
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en 
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.&lt;/ref&gt;
|}

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>e4xmgihq86olyg82c9vrhi9cqs8cxy4</sha1>
    </revision>
    <revision>
      <id>85344</id>
      <parentid>85343</parentid>
      <timestamp>2022-08-05T23:43:29Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>nit</comment>
      <origin>85344</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="14841" sha1="qcqcz9npeyee5soz5dk9jm1mbbwm3xy" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;
   
   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.
         
   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.
      
   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc. 
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/derivative-maker/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]]. 

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ 
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/ 
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor 
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution 
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en 
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
| 
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
| 
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
| 
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.&lt;/ref&gt;
|}

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>qcqcz9npeyee5soz5dk9jm1mbbwm3xy</sha1>
    </revision>
    <revision>
      <id>85409</id>
      <parentid>85344</parentid>
      <timestamp>2022-08-07T22:05:10Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>mediawiki-shell-bot-default-edit-message</comment>
      <origin>85409</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="14813" sha1="azwwqp68dioymq1qh59ha2nur5ygckf" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/derivative-maker/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

{| class="wikitable"
|-
! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-
! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-
! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-
! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.&lt;/ref&gt;
|}

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>azwwqp68dioymq1qh59ha2nur5ygckf</sha1>
    </revision>
    <revision>
      <id>87286</id>
      <parentid>85409</parentid>
      <timestamp>2022-09-01T15:48:31Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Summary */</comment>
      <origin>87286</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="14857" sha1="ecydxvqxbzj7pqjojx92fqjagw1gpoa" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/derivative-maker/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-
! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-
| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>ecydxvqxbzj7pqjojx92fqjagw1gpoa</sha1>
    </revision>
    <revision>
      <id>87495</id>
      <parentid>87286</parentid>
      <timestamp>2022-09-08T10:26:53Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* {{project_name_short}} Version */</comment>
      <origin>87495</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="14863" sha1="3jxuemer6v1dji4lbqldiq60tyzymy5" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/derivative-maker/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>3jxuemer6v1dji4lbqldiq60tyzymy5</sha1>
    </revision>
    <revision>
      <id>87496</id>
      <parentid>87495</parentid>
      <timestamp>2022-09-08T10:27:19Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* {{project_name_short}} Version */</comment>
      <origin>87496</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="14897" sha1="9yvtwlp2444vxj8u029qf5dlaieu0st" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/derivative-maker/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>9yvtwlp2444vxj8u029qf5dlaieu0st</sha1>
    </revision>
    <revision>
      <id>88605</id>
      <parentid>87496</parentid>
      <timestamp>2022-10-15T10:29:16Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "github.com/derivative-maker" to "github.com/{{project_name_short}}"</comment>
      <origin>88605</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="14903" sha1="nrank4zikvefg31q23c0zmyzbmby4cj" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping users run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>nrank4zikvefg31q23c0zmyzbmby4cj</sha1>
    </revision>
    <revision>
      <id>88987</id>
      <parentid>88605</parentid>
      <timestamp>2022-10-22T19:31:18Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Introduction */</comment>
      <origin>88987</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="14923" sha1="enbdb1httrv05rq1jlcipdd0mw1ypuc" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
Design and Goals
}}
{{#seo:
|description={{project name long}} routes all traffic through Tor. {{project_name_long}} Overview. Online Anonymity via Tor and Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=https://www.{{project_clearnet}}/w/images/thumb/7/70/Information-275708-640.png/470px-Information-275708-640.png
}}
[[image:Information-275708-640.png|thumb]]
= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping [[Users_of_Whonix|users]] run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>enbdb1httrv05rq1jlcipdd0mw1ypuc</sha1>
    </revision>
    <revision>
      <id>89117</id>
      <parentid>88987</parentid>
      <timestamp>2022-10-28T09:45:55Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89117</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="23788" sha1="20drtvoajriorgguqd1b6qke95m7zrs" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;

__NOTOC__
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|text=
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. Based on the Tor anonymity network, {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Debian GNU/Linux and the principle of security by isolation, {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network, meaning all connections are forced through Tor or blocked. The Tor network helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|imageright=1
|text=
{{project_name_long}} uses an extensively reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-10"&gt;&lt;/div&gt;

== {{project_name_long}} Architecture ==

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt;
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

== Full Spectrum Anti-Tracking Protection ==
Hiding your identity is harder than just hiding your IP. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

== {{project_name_long}} User Groups ==

{{LeftRightImageText
|image=Spy.jpg
|imageright=1
|text=
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. Without precautions, the Internet service provider (ISP) and global surveillance systems can record everything done online, as IP addresses associated with network activity are easily linked with the physical location of a user's computer(s). {{project_name_long}} is one solution to this problem.

Anyone who values privacy or does sensitive work on their desktop or online can benefit from using {{project_name_long}}. This includes, but is not limited to:
}}

* Investigators and whistleblowers whose work threatens the powerful.
** Within an isolated environment, research and evidence can be gathered without accidental exposure.
* Researchers, government officials or business-people who may be targets of espionage.
** Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
* Journalists who endanger themselves and their families by reporting on organized crime.
** Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
* Political activists under targeted surveillance and attack.
** The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
* Average computer users in a repressive or censored environment.
** Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
* Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed.
** {{project_name_long}} does not silently upload identifying information in the background.

See also [[Users_of_Whonix|Users of {{project name long}}]].

== Footnotes ==

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

{{Footer}}















= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping [[Users_of_Whonix|users]] run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>20drtvoajriorgguqd1b6qke95m7zrs</sha1>
    </revision>
    <revision>
      <id>89118</id>
      <parentid>89117</parentid>
      <timestamp>2022-10-28T09:46:23Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89118</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="23786" sha1="hhs0ks6jebdyz20zlb5phfts68se15c" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;__NOTOC__
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|text=
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. Based on the Tor anonymity network, {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Debian GNU/Linux and the principle of security by isolation, {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network, meaning all connections are forced through Tor or blocked. The Tor network helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|imageright=1
|text=
{{project_name_long}} uses an extensively reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-10"&gt;&lt;/div&gt;

== {{project_name_long}} Architecture ==

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt;
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

== Full Spectrum Anti-Tracking Protection ==
Hiding your identity is harder than just hiding your IP. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

== {{project_name_long}} User Groups ==

{{LeftRightImageText
|image=Spy.jpg
|imageright=1
|text=
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. Without precautions, the Internet service provider (ISP) and global surveillance systems can record everything done online, as IP addresses associated with network activity are easily linked with the physical location of a user's computer(s). {{project_name_long}} is one solution to this problem.

Anyone who values privacy or does sensitive work on their desktop or online can benefit from using {{project_name_long}}. This includes, but is not limited to:
}}

* Investigators and whistleblowers whose work threatens the powerful.
** Within an isolated environment, research and evidence can be gathered without accidental exposure.
* Researchers, government officials or business-people who may be targets of espionage.
** Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
* Journalists who endanger themselves and their families by reporting on organized crime.
** Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
* Political activists under targeted surveillance and attack.
** The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
* Average computer users in a repressive or censored environment.
** Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
* Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed.
** {{project_name_long}} does not silently upload identifying information in the background.

See also [[Users_of_Whonix|Users of {{project name long}}]].

== Footnotes ==

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

{{Footer}}















= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping [[Users_of_Whonix|users]] run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =
{{reflist|close=1}}

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>hhs0ks6jebdyz20zlb5phfts68se15c</sha1>
    </revision>
    <revision>
      <id>89119</id>
      <parentid>89118</parentid>
      <timestamp>2022-10-28T09:47:42Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89119</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="23738" sha1="k3ir9s2stqiapurutik5arl8dzdixg7" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;__NOTOC__
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|text=
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. Based on the Tor anonymity network, {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Debian GNU/Linux and the principle of security by isolation, {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network, meaning all connections are forced through Tor or blocked. The Tor network helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|imageright=1
|text=
{{project_name_long}} uses an extensively reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-10"&gt;&lt;/div&gt;

== {{project_name_long}} Architecture ==

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt;
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

== Full Spectrum Anti-Tracking Protection ==
Hiding your identity is harder than just hiding your IP. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

== {{project_name_long}} User Groups ==

{{LeftRightImageText
|image=Spy.jpg
|imageright=1
|text=
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. Without precautions, the Internet service provider (ISP) and global surveillance systems can record everything done online, as IP addresses associated with network activity are easily linked with the physical location of a user's computer(s). {{project_name_long}} is one solution to this problem.

Anyone who values privacy or does sensitive work on their desktop or online can benefit from using {{project_name_long}}. This includes, but is not limited to:
}}

* Investigators and whistleblowers whose work threatens the powerful.
** Within an isolated environment, research and evidence can be gathered without accidental exposure.
* Researchers, government officials or business-people who may be targets of espionage.
** Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
* Journalists who endanger themselves and their families by reporting on organized crime.
** Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
* Political activists under targeted surveillance and attack.
** The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
* Average computer users in a repressive or censored environment.
** Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
* Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed.
** {{project_name_long}} does not silently upload identifying information in the background.

See also [[Users_of_Whonix|Users of {{project name long}}]].













= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping [[Users_of_Whonix|users]] run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


== Footnotes ==

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>k3ir9s2stqiapurutik5arl8dzdixg7</sha1>
    </revision>
    <revision>
      <id>89128</id>
      <parentid>89119</parentid>
      <timestamp>2022-10-28T10:11:33Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89128</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="23817" sha1="hhuq4q8akmgij4cyoe5s963g104lns6" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;__NOTOC__
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

&lt;div class="promo-style"&gt;

{{LeftRightImageText
|image=Whonix-homepage-main.png
|text=
&lt;h3&gt;Superior Internet privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. Based on the Tor anonymity network, {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Debian GNU/Linux and the principle of security by isolation, {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network, meaning all connections are forced through Tor or blocked. The Tor network helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|imageright=1
|text=
{{project_name_long}} uses an extensively reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;/div&gt;

&lt;div class="vspacer-20 margin-top-10"&gt;&lt;/div&gt;

== {{project_name_long}} Architecture ==

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt;
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

== Full Spectrum Anti-Tracking Protection ==
Hiding your identity is harder than just hiding your IP. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

== {{project_name_long}} User Groups ==

{{LeftRightImageText
|image=Spy.jpg
|imageright=1
|text=
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. Without precautions, the Internet service provider (ISP) and global surveillance systems can record everything done online, as IP addresses associated with network activity are easily linked with the physical location of a user's computer(s). {{project_name_long}} is one solution to this problem.

Anyone who values privacy or does sensitive work on their desktop or online can benefit from using {{project_name_long}}. This includes, but is not limited to:
}}

* Investigators and whistleblowers whose work threatens the powerful.
** Within an isolated environment, research and evidence can be gathered without accidental exposure.
* Researchers, government officials or business-people who may be targets of espionage.
** Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
* Journalists who endanger themselves and their families by reporting on organized crime.
** Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
* Political activists under targeted surveillance and attack.
** The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
* Average computer users in a repressive or censored environment.
** Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
* Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed.
** {{project_name_long}} does not silently upload identifying information in the background.

See also [[Users_of_Whonix|Users of {{project name long}}]].













= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping [[Users_of_Whonix|users]] run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


== Footnotes ==

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>hhuq4q8akmgij4cyoe5s963g104lns6</sha1>
    </revision>
    <revision>
      <id>89129</id>
      <parentid>89128</parentid>
      <timestamp>2022-10-28T10:12:19Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89129</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="23809" sha1="q1ra09iuywzgvtk45plbtw47xdns9tp" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;__NOTOC__
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

&lt;div class="promo-style"&gt;

{{LeftRightImageText
|image=Whonix-homepage-main.png
|text=
&lt;h3&gt;Superior Internet privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. Based on the Tor anonymity network, {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Debian GNU/Linux and the principle of security by isolation, {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network, meaning all connections are forced through Tor or blocked. The Tor network helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|imageright=1
|text=
{{project_name_long}} uses an extensively reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-10"&gt;&lt;/div&gt;

== {{project_name_long}} Architecture ==

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt;
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

== Full Spectrum Anti-Tracking Protection ==
Hiding your identity is harder than just hiding your IP. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

== {{project_name_long}} User Groups ==

{{LeftRightImageText
|image=Spy.jpg
|imageright=1
|text=
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. Without precautions, the Internet service provider (ISP) and global surveillance systems can record everything done online, as IP addresses associated with network activity are easily linked with the physical location of a user's computer(s). {{project_name_long}} is one solution to this problem.

Anyone who values privacy or does sensitive work on their desktop or online can benefit from using {{project_name_long}}. This includes, but is not limited to:
}}

* Investigators and whistleblowers whose work threatens the powerful.
** Within an isolated environment, research and evidence can be gathered without accidental exposure.
* Researchers, government officials or business-people who may be targets of espionage.
** Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
* Journalists who endanger themselves and their families by reporting on organized crime.
** Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
* Political activists under targeted surveillance and attack.
** The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
* Average computer users in a repressive or censored environment.
** Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
* Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed.
** {{project_name_long}} does not silently upload identifying information in the background.

See also [[Users_of_Whonix|Users of {{project name long}}]].













= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping [[Users_of_Whonix|users]] run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


== Footnotes ==

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>q1ra09iuywzgvtk45plbtw47xdns9tp</sha1>
    </revision>
    <revision>
      <id>89130</id>
      <parentid>89129</parentid>
      <timestamp>2022-10-28T10:12:49Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89130</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="23826" sha1="aizimqh8t075uko6y6mc9xgylqwmab4" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;__NOTOC__
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

&lt;div class="promo-style"&gt;

{{LeftRightImageText
|image=Whonix-homepage-main.png
|text=
&lt;h3&gt;Superior Internet privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. Based on the Tor anonymity network, {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Debian GNU/Linux and the principle of security by isolation, {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network, meaning all connections are forced through Tor or blocked. The Tor network helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|imageright=1
|text=
&lt;p&gt;
{{project_name_long}} uses an extensively reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;/div&gt;

&lt;div class="vspacer-20 margin-top-10"&gt;&lt;/div&gt;

== {{project_name_long}} Architecture ==

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt;
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

== Full Spectrum Anti-Tracking Protection ==
Hiding your identity is harder than just hiding your IP. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

== {{project_name_long}} User Groups ==

{{LeftRightImageText
|image=Spy.jpg
|imageright=1
|text=
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. Without precautions, the Internet service provider (ISP) and global surveillance systems can record everything done online, as IP addresses associated with network activity are easily linked with the physical location of a user's computer(s). {{project_name_long}} is one solution to this problem.

Anyone who values privacy or does sensitive work on their desktop or online can benefit from using {{project_name_long}}. This includes, but is not limited to:
}}

* Investigators and whistleblowers whose work threatens the powerful.
** Within an isolated environment, research and evidence can be gathered without accidental exposure.
* Researchers, government officials or business-people who may be targets of espionage.
** Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
* Journalists who endanger themselves and their families by reporting on organized crime.
** Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
* Political activists under targeted surveillance and attack.
** The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
* Average computer users in a repressive or censored environment.
** Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
* Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed.
** {{project_name_long}} does not silently upload identifying information in the background.

See also [[Users_of_Whonix|Users of {{project name long}}]].













= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping [[Users_of_Whonix|users]] run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


== Footnotes ==

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>aizimqh8t075uko6y6mc9xgylqwmab4</sha1>
    </revision>
    <revision>
      <id>89131</id>
      <parentid>89130</parentid>
      <timestamp>2022-10-28T10:17:26Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89131</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="23536" sha1="ehejwxdaglif9q4vs2562wap10fsbgh" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;__NOTOC__
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

&lt;div class="promo-style"&gt;

{{LeftRightImageText
|image=Whonix-homepage-main.png
|text=
&lt;h3&gt;Superior Internet privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. Based on the Tor anonymity network and {{Kicksecure_link
|
|{{Kicksecure}}
}} - security-focused Linux Distribution) - also Debian GNU/Linux and the principle of security by isolation, {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers.&lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|imageright=1
|text=
&lt;p&gt;
{{project_name_long}} uses an extensively reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;/div&gt;

&lt;div class="vspacer-20 margin-top-10"&gt;&lt;/div&gt;

== {{project_name_long}} Architecture ==

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt;
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

== Full Spectrum Anti-Tracking Protection ==
Hiding your identity is harder than just hiding your IP. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

== {{project_name_long}} User Groups ==

{{LeftRightImageText
|image=Spy.jpg
|imageright=1
|text=
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. Without precautions, the Internet service provider (ISP) and global surveillance systems can record everything done online, as IP addresses associated with network activity are easily linked with the physical location of a user's computer(s). {{project_name_long}} is one solution to this problem.

Anyone who values privacy or does sensitive work on their desktop or online can benefit from using {{project_name_long}}. This includes, but is not limited to:
}}

* Investigators and whistleblowers whose work threatens the powerful.
** Within an isolated environment, research and evidence can be gathered without accidental exposure.
* Researchers, government officials or business-people who may be targets of espionage.
** Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
* Journalists who endanger themselves and their families by reporting on organized crime.
** Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
* Political activists under targeted surveillance and attack.
** The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
* Average computer users in a repressive or censored environment.
** Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
* Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed.
** {{project_name_long}} does not silently upload identifying information in the background.

See also [[Users_of_Whonix|Users of {{project name long}}]].













= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping [[Users_of_Whonix|users]] run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


== Footnotes ==

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>ehejwxdaglif9q4vs2562wap10fsbgh</sha1>
    </revision>
    <revision>
      <id>89132</id>
      <parentid>89131</parentid>
      <timestamp>2022-10-28T10:18:58Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89132</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="23028" sha1="prcmfhzz5k3hg8wcxb75p6d5iwf2rdo" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;__NOTOC__
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

&lt;div class="promo-style"&gt;

{{LeftRightImageText
|image=Whonix-homepage-main.png
|text=
&lt;h3&gt;Superior Internet privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. Based on the Tor anonymity network and {{Kicksecure_link
|
|{{Kicksecure}}
}} - security-focused Linux Distribution) - also Debian GNU/Linux and the principle of security by isolation, {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network.
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|imageright=1
|text=
&lt;p&gt;
{{project_name_long}} uses an extensively reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;/div&gt;

&lt;div class="vspacer-20 margin-top-10"&gt;&lt;/div&gt;

== {{project_name_long}} Architecture ==

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt;
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

== Full Spectrum Anti-Tracking Protection ==
Hiding your identity is harder than just hiding your IP. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

== {{project_name_long}} User Groups ==

{{LeftRightImageText
|image=Spy.jpg
|imageright=1
|text=
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. Without precautions, the Internet service provider (ISP) and global surveillance systems can record everything done online, as IP addresses associated with network activity are easily linked with the physical location of a user's computer(s). {{project_name_long}} is one solution to this problem.

Anyone who values privacy or does sensitive work on their desktop or online can benefit from using {{project_name_long}}. This includes, but is not limited to:
}}

* Investigators and whistleblowers whose work threatens the powerful.
** Within an isolated environment, research and evidence can be gathered without accidental exposure.
* Researchers, government officials or business-people who may be targets of espionage.
** Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
* Journalists who endanger themselves and their families by reporting on organized crime.
** Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
* Political activists under targeted surveillance and attack.
** The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
* Average computer users in a repressive or censored environment.
** Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
* Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed.
** {{project_name_long}} does not silently upload identifying information in the background.

See also [[Users_of_Whonix|Users of {{project name long}}]].













= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping [[Users_of_Whonix|users]] run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


== Footnotes ==

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>prcmfhzz5k3hg8wcxb75p6d5iwf2rdo</sha1>
    </revision>
    <revision>
      <id>89133</id>
      <parentid>89132</parentid>
      <timestamp>2022-10-28T10:22:37Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89133</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="22921" sha1="fx5j4qrhokcg37vwl0ozatd3xfpk28a" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;__NOTOC__
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

&lt;div class="promo-style"&gt;

{{LeftRightImageText
|image=Whonix-homepage-main.png
|text=
&lt;h3&gt;Superior Internet privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, Debian, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[Learn More|#overview]]
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|imageright=1
|text=
&lt;p&gt;
{{project_name_long}} uses an extensively reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;/div&gt;

&lt;div class="vspacer-20 margin-top-10"&gt;&lt;/div&gt;

== {{project_name_long}} Architecture ==

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt;
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

== Full Spectrum Anti-Tracking Protection ==
Hiding your identity is harder than just hiding your IP. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

== {{project_name_long}} User Groups ==

{{LeftRightImageText
|image=Spy.jpg
|imageright=1
|text=
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. Without precautions, the Internet service provider (ISP) and global surveillance systems can record everything done online, as IP addresses associated with network activity are easily linked with the physical location of a user's computer(s). {{project_name_long}} is one solution to this problem.

Anyone who values privacy or does sensitive work on their desktop or online can benefit from using {{project_name_long}}. This includes, but is not limited to:
}}

* Investigators and whistleblowers whose work threatens the powerful.
** Within an isolated environment, research and evidence can be gathered without accidental exposure.
* Researchers, government officials or business-people who may be targets of espionage.
** Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
* Journalists who endanger themselves and their families by reporting on organized crime.
** Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
* Political activists under targeted surveillance and attack.
** The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
* Average computer users in a repressive or censored environment.
** Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
* Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed.
** {{project_name_long}} does not silently upload identifying information in the background.

See also [[Users_of_Whonix|Users of {{project name long}}]].













= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping [[Users_of_Whonix|users]] run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


== Footnotes ==

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>fx5j4qrhokcg37vwl0ozatd3xfpk28a</sha1>
    </revision>
    <revision>
      <id>89134</id>
      <parentid>89133</parentid>
      <timestamp>2022-10-28T10:23:33Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89134</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="22921" sha1="jm4f3b8dl03706qz426vqn1srsbq9cn" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;__NOTOC__
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

&lt;div class="promo-style"&gt;

{{LeftRightImageText
|image=Whonix-homepage-main.png
|text=
&lt;h3&gt;Superior Internet privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, Debian, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[Learn More #overview]]
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|imageright=1
|text=
&lt;p&gt;
{{project_name_long}} uses an extensively reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;/div&gt;

&lt;div class="vspacer-20 margin-top-10"&gt;&lt;/div&gt;

== {{project_name_long}} Architecture ==

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt;
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

== Full Spectrum Anti-Tracking Protection ==
Hiding your identity is harder than just hiding your IP. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

== {{project_name_long}} User Groups ==

{{LeftRightImageText
|image=Spy.jpg
|imageright=1
|text=
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. Without precautions, the Internet service provider (ISP) and global surveillance systems can record everything done online, as IP addresses associated with network activity are easily linked with the physical location of a user's computer(s). {{project_name_long}} is one solution to this problem.

Anyone who values privacy or does sensitive work on their desktop or online can benefit from using {{project_name_long}}. This includes, but is not limited to:
}}

* Investigators and whistleblowers whose work threatens the powerful.
** Within an isolated environment, research and evidence can be gathered without accidental exposure.
* Researchers, government officials or business-people who may be targets of espionage.
** Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
* Journalists who endanger themselves and their families by reporting on organized crime.
** Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
* Political activists under targeted surveillance and attack.
** The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
* Average computer users in a repressive or censored environment.
** Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
* Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed.
** {{project_name_long}} does not silently upload identifying information in the background.

See also [[Users_of_Whonix|Users of {{project name long}}]].













= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping [[Users_of_Whonix|users]] run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


== Footnotes ==

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>jm4f3b8dl03706qz426vqn1srsbq9cn</sha1>
    </revision>
    <revision>
      <id>89135</id>
      <parentid>89134</parentid>
      <timestamp>2022-10-28T10:24:34Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89135</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="22926" sha1="390vxfce7h3rdzgs9znbyxml2ntju08" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;__NOTOC__
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

&lt;div class="promo-style"&gt;

{{LeftRightImageText
|image=Whonix-homepage-main.png
|text=
&lt;h3&gt;Superior Internet privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, Debian, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#general-info|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|imageright=1
|text=
&lt;p&gt;
{{project_name_long}} uses an extensively reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;/div&gt;

&lt;div class="vspacer-20 margin-top-10"&gt;&lt;/div&gt;

== {{project_name_long}} Architecture ==

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt;
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

== Full Spectrum Anti-Tracking Protection ==
Hiding your identity is harder than just hiding your IP. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

== {{project_name_long}} User Groups ==

{{LeftRightImageText
|image=Spy.jpg
|imageright=1
|text=
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. Without precautions, the Internet service provider (ISP) and global surveillance systems can record everything done online, as IP addresses associated with network activity are easily linked with the physical location of a user's computer(s). {{project_name_long}} is one solution to this problem.

Anyone who values privacy or does sensitive work on their desktop or online can benefit from using {{project_name_long}}. This includes, but is not limited to:
}}

* Investigators and whistleblowers whose work threatens the powerful.
** Within an isolated environment, research and evidence can be gathered without accidental exposure.
* Researchers, government officials or business-people who may be targets of espionage.
** Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
* Journalists who endanger themselves and their families by reporting on organized crime.
** Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
* Political activists under targeted surveillance and attack.
** The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
* Average computer users in a repressive or censored environment.
** Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
* Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed.
** {{project_name_long}} does not silently upload identifying information in the background.

See also [[Users_of_Whonix|Users of {{project name long}}]].













= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].

{{project_name_long}} aims to preserve privacy and anonymity by helping [[Users_of_Whonix|users]] run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


== Footnotes ==

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>390vxfce7h3rdzgs9znbyxml2ntju08</sha1>
    </revision>
    <revision>
      <id>89136</id>
      <parentid>89135</parentid>
      <timestamp>2022-10-28T10:25:35Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89136</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="23797" sha1="czuvecere4azubciq4u3ryso3wo3529" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;__NOTOC__
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

&lt;div class="promo-style"&gt;

{{LeftRightImageText
|image=Whonix-homepage-main.png
|text=
&lt;h3&gt;Superior Internet privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, Debian, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|imageright=1
|text=
&lt;p&gt;
{{project_name_long}} uses an extensively reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;/div&gt;

&lt;div class="vspacer-20 margin-top-10"&gt;&lt;/div&gt;

== {{project_name_long}} Architecture ==

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt;
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

== Full Spectrum Anti-Tracking Protection ==
Hiding your identity is harder than just hiding your IP. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

== {{project_name_long}} User Groups ==

{{LeftRightImageText
|image=Spy.jpg
|imageright=1
|text=
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. Without precautions, the Internet service provider (ISP) and global surveillance systems can record everything done online, as IP addresses associated with network activity are easily linked with the physical location of a user's computer(s). {{project_name_long}} is one solution to this problem.

Anyone who values privacy or does sensitive work on their desktop or online can benefit from using {{project_name_long}}. This includes, but is not limited to:
}}

* Investigators and whistleblowers whose work threatens the powerful.
** Within an isolated environment, research and evidence can be gathered without accidental exposure.
* Researchers, government officials or business-people who may be targets of espionage.
** Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
* Journalists who endanger themselves and their families by reporting on organized crime.
** Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
* Political activists under targeted surveillance and attack.
** The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
* Average computer users in a repressive or censored environment.
** Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
* Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed.
** {{project_name_long}} does not silently upload identifying information in the background.

See also [[Users_of_Whonix|Users of {{project name long}}]].
















= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project name long}} routes &lt;u&gt;all&lt;/u&gt; traffic through Tor, which is is currently the [[Why_does_Whonix_use_Tor|best available anonymity network]].


This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;
Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network.



{{project_name_long}} aims to preserve privacy and anonymity by helping [[Users_of_Whonix|users]] run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


== Footnotes ==

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>czuvecere4azubciq4u3ryso3wo3529</sha1>
    </revision>
    <revision>
      <id>89137</id>
      <parentid>89136</parentid>
      <timestamp>2022-10-28T10:35:58Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89137</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="24584" sha1="mqk4dzwit7cv5wj42aljbli3op6o256" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;__NOTOC__
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

&lt;div class="promo-style"&gt;

{{LeftRightImageText
|image=Whonix-homepage-main.png
|text=
&lt;h3&gt;Superior Internet privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|imageright=1
|text=
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;/div&gt;

&lt;div class="vspacer-20 margin-top-10"&gt;&lt;/div&gt;

== {{project_name_long}} Architecture ==

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt;
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

== Full Spectrum Anti-Tracking Protection ==
Hiding your identity is harder than just hiding your IP. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

== {{project_name_long}} User Groups ==

{{LeftRightImageText
|image=Spy.jpg
|imageright=1
|text=
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. Without precautions, the Internet service provider (ISP) and global surveillance systems can record everything done online, as IP addresses associated with network activity are easily linked with the physical location of a user's computer(s). {{project_name_long}} is one solution to this problem.

Anyone who values privacy or does sensitive work on their desktop or online can benefit from using {{project_name_long}}. This includes, but is not limited to:
}}

* Investigators and whistleblowers whose work threatens the powerful.
** Within an isolated environment, research and evidence can be gathered without accidental exposure.
* Researchers, government officials or business-people who may be targets of espionage.
** Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
* Journalists who endanger themselves and their families by reporting on organized crime.
** Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
* Political activists under targeted surveillance and attack.
** The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
* Average computer users in a repressive or censored environment.
** Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
* Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed.
** {{project_name_long}} does not silently upload identifying information in the background.

See also [[Users_of_Whonix|Users of {{project name long}}]].
















= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].

This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;
Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network.

{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.





{{project_name_long}} aims to preserve privacy and anonymity by helping [[Users_of_Whonix|users]] run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


== Footnotes ==

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>mqk4dzwit7cv5wj42aljbli3op6o256</sha1>
    </revision>
    <revision>
      <id>89144</id>
      <parentid>89137</parentid>
      <timestamp>2022-10-28T10:45:17Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89144</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="24632" sha1="lhc5db9jphrdosdux39ifinl7sj1nbo" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;__NOTOC__
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

&lt;div class="promo-style"&gt;

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;/div&gt;

&lt;div class="vspacer-20 margin-top-10"&gt;&lt;/div&gt;

== {{project_name_long}} Architecture ==

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt;
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

== Full Spectrum Anti-Tracking Protection ==
Hiding your identity is harder than just hiding your IP. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

== {{project_name_long}} User Groups ==

{{LeftRightImageText
|image=Spy.jpg
|imageright=1
|text=
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. Without precautions, the Internet service provider (ISP) and global surveillance systems can record everything done online, as IP addresses associated with network activity are easily linked with the physical location of a user's computer(s). {{project_name_long}} is one solution to this problem.

Anyone who values privacy or does sensitive work on their desktop or online can benefit from using {{project_name_long}}. This includes, but is not limited to:
}}

* Investigators and whistleblowers whose work threatens the powerful.
** Within an isolated environment, research and evidence can be gathered without accidental exposure.
* Researchers, government officials or business-people who may be targets of espionage.
** Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
* Journalists who endanger themselves and their families by reporting on organized crime.
** Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
* Political activists under targeted surveillance and attack.
** The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
* Average computer users in a repressive or censored environment.
** Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
* Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed.
** {{project_name_long}} does not silently upload identifying information in the background.

See also [[Users_of_Whonix|Users of {{project name long}}]].
















= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].

This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;
Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network.

{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.





{{project_name_long}} aims to preserve privacy and anonymity by helping [[Users_of_Whonix|users]] run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


== Footnotes ==

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>lhc5db9jphrdosdux39ifinl7sj1nbo</sha1>
    </revision>
    <revision>
      <id>89145</id>
      <parentid>89144</parentid>
      <timestamp>2022-10-28T10:47:19Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89145</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="24597" sha1="lqnuc4weid58j69r0oknikrls4ah9d0" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;__NOTOC__
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-10"&gt;&lt;/div&gt;

== {{project_name_long}} Architecture ==

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt;
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

== Full Spectrum Anti-Tracking Protection ==
Hiding your identity is harder than just hiding your IP. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

== {{project_name_long}} User Groups ==

{{LeftRightImageText
|image=Spy.jpg
|imageright=1
|text=
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. Without precautions, the Internet service provider (ISP) and global surveillance systems can record everything done online, as IP addresses associated with network activity are easily linked with the physical location of a user's computer(s). {{project_name_long}} is one solution to this problem.

Anyone who values privacy or does sensitive work on their desktop or online can benefit from using {{project_name_long}}. This includes, but is not limited to:
}}

* Investigators and whistleblowers whose work threatens the powerful.
** Within an isolated environment, research and evidence can be gathered without accidental exposure.
* Researchers, government officials or business-people who may be targets of espionage.
** Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
* Journalists who endanger themselves and their families by reporting on organized crime.
** Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
* Political activists under targeted surveillance and attack.
** The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
* Average computer users in a repressive or censored environment.
** Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
* Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed.
** {{project_name_long}} does not silently upload identifying information in the background.

See also [[Users_of_Whonix|Users of {{project name long}}]].
















= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].

This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;
Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network.

{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.





{{project_name_long}} aims to preserve privacy and anonymity by helping [[Users_of_Whonix|users]] run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


== Footnotes ==

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>lqnuc4weid58j69r0oknikrls4ah9d0</sha1>
    </revision>
    <revision>
      <id>89147</id>
      <parentid>89145</parentid>
      <timestamp>2022-10-28T11:10:02Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89147</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="25106" sha1="osl3cbyfx24c5tat3xkvrbse3jngxnx" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;__NOTOC__
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is one solution to this problem. Anyone who values privacy or does sensitive work on their desktop or online can benefit from using {{project_name_long}}.
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-10"&gt;&lt;/div&gt;

== {{project_name_long}} Architecture ==

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt;
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

== Full Spectrum Anti-Tracking Protection ==
Hiding your identity is harder than just hiding your IP. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

== {{project_name_long}} User Groups ==

{{LeftRightImageText
|image=Spy.jpg
|imageright=1
|text=
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. Without precautions, the Internet service provider (ISP) and global surveillance systems can record everything done online, as IP addresses associated with network activity are easily linked with the physical location of a user's computer(s). {{project_name_long}} is one solution to this problem.

Anyone who values privacy or does sensitive work on their desktop or online can benefit from using {{project_name_long}}. This includes, but is not limited to:
}}

* Investigators and whistleblowers whose work threatens the powerful.
** Within an isolated environment, research and evidence can be gathered without accidental exposure.
* Researchers, government officials or business-people who may be targets of espionage.
** Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
* Journalists who endanger themselves and their families by reporting on organized crime.
** Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
* Political activists under targeted surveillance and attack.
** The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
* Average computer users in a repressive or censored environment.
** Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
* Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed.
** {{project_name_long}} does not silently upload identifying information in the background.

See also [[Users_of_Whonix|Users of {{project name long}}]].
















= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].

This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;
Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network.

{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.





{{project_name_long}} aims to preserve privacy and anonymity by helping [[Users_of_Whonix|users]] run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


== Footnotes ==

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>osl3cbyfx24c5tat3xkvrbse3jngxnx</sha1>
    </revision>
    <revision>
      <id>89148</id>
      <parentid>89147</parentid>
      <timestamp>2022-10-28T11:11:43Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89148</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="24994" sha1="h1ipbvzjhzns4f9buny4j98r009lwtl" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;__NOTOC__
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}.
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-10"&gt;&lt;/div&gt;

== {{project_name_long}} Architecture ==

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt;
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

== Full Spectrum Anti-Tracking Protection ==
Hiding your identity is harder than just hiding your IP. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

== {{project_name_long}} User Groups ==

{{LeftRightImageText
|image=Spy.jpg
|imageright=1
|text=
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes, but is not limited to:
}}

* Investigators and whistleblowers whose work threatens the powerful.
** Within an isolated environment, research and evidence can be gathered without accidental exposure.
* Researchers, government officials or business-people who may be targets of espionage.
** Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
* Journalists who endanger themselves and their families by reporting on organized crime.
** Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
* Political activists under targeted surveillance and attack.
** The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
* Average computer users in a repressive or censored environment.
** Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
* Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed.
** {{project_name_long}} does not silently upload identifying information in the background.

See also [[Users_of_Whonix|Users of {{project name long}}]].
















= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].

This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;
Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network.

{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.





{{project_name_long}} aims to preserve privacy and anonymity by helping [[Users_of_Whonix|users]] run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


== Footnotes ==

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>h1ipbvzjhzns4f9buny4j98r009lwtl</sha1>
    </revision>
    <revision>
      <id>89149</id>
      <parentid>89148</parentid>
      <timestamp>2022-10-28T11:12:44Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89149</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="25040" sha1="qb7dh054qzaolvn07vw4k9avscy3uhj" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;__NOTOC__
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-10"&gt;&lt;/div&gt;

== {{project_name_long}} Architecture ==

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt;
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

== Full Spectrum Anti-Tracking Protection ==
Hiding your identity is harder than just hiding your IP. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

== {{project_name_long}} User Groups ==

{{LeftRightImageText
|image=Spy.jpg
|imageright=1
|text=
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes, but is not limited to:
}}

* Investigators and whistleblowers whose work threatens the powerful.
** Within an isolated environment, research and evidence can be gathered without accidental exposure.
* Researchers, government officials or business-people who may be targets of espionage.
** Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
* Journalists who endanger themselves and their families by reporting on organized crime.
** Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
* Political activists under targeted surveillance and attack.
** The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
* Average computer users in a repressive or censored environment.
** Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
* Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed.
** {{project_name_long}} does not silently upload identifying information in the background.

See also [[Users_of_Whonix|Users of {{project name long}}]].
















= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].

This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;
Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network.

{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.





{{project_name_long}} aims to preserve privacy and anonymity by helping [[Users_of_Whonix|users]] run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


== Footnotes ==

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>qb7dh054qzaolvn07vw4k9avscy3uhj</sha1>
    </revision>
    <revision>
      <id>89150</id>
      <parentid>89149</parentid>
      <timestamp>2022-10-28T11:19:51Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89150</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="25672" sha1="nt0m8br6n4z7zxms1jyca55u77dx87q" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;__NOTOC__
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-10"&gt;&lt;/div&gt;

== {{project_name_long}} Architecture ==

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt;
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

== Full Spectrum Anti-Tracking Protection ==
Hiding your identity is harder than just hiding your IP. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

== {{project_name_long}} User Groups ==

{{LeftRightImageText
|image=Spy.jpg
|imageright=1
|text=
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes, but is not limited to:
}}

* Investigators and whistleblowers whose work threatens the powerful.
** Within an isolated environment, research and evidence can be gathered without accidental exposure.
* Researchers, government officials or business-people who may be targets of espionage.
** Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
* Journalists who endanger themselves and their families by reporting on organized crime.
** Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
* Political activists under targeted surveillance and attack.
** The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
* Average computer users in a repressive or censored environment.
** Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
* Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed.
** {{project_name_long}} does not silently upload identifying information in the background.

See also [[Users_of_Whonix|Users of {{project name long}}]].
















= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].

This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;
Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network.

{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.





{{project_name_long}} aims to preserve privacy and anonymity by helping [[Users_of_Whonix|users]] run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


== Footnotes ==

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>nt0m8br6n4z7zxms1jyca55u77dx87q</sha1>
    </revision>
    <revision>
      <id>89151</id>
      <parentid>89150</parentid>
      <timestamp>2022-10-28T11:23:46Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89151</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="25972" sha1="putbyyla306baz0f2j0tw0uphloejny" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;__NOTOC__
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-10"&gt;&lt;/div&gt;

== {{project_name_long}} Architecture ==

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt;
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

== Full Spectrum Anti-Tracking Protection ==
Hiding your identity is harder than just hiding your IP. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

== {{project_name_long}} User Groups ==

{{LeftRightImageText
|image=Spy.jpg
|imageright=1
|text=
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes, but is not limited to:
}}

* Investigators and whistleblowers whose work threatens the powerful.
** Within an isolated environment, research and evidence can be gathered without accidental exposure.
* Researchers, government officials or business-people who may be targets of espionage.
** Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
* Journalists who endanger themselves and their families by reporting on organized crime.
** Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
* Political activists under targeted surveillance and attack.
** The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
* Average computer users in a repressive or censored environment.
** Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
* Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed.
** {{project_name_long}} does not silently upload identifying information in the background.

See also [[Users_of_Whonix|Users of {{project name long}}]].
















= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].

This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;
Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network.

{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.





{{project_name_long}} aims to preserve privacy and anonymity by helping [[Users_of_Whonix|users]] run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


== Footnotes ==

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>putbyyla306baz0f2j0tw0uphloejny</sha1>
    </revision>
    <revision>
      <id>89153</id>
      <parentid>89151</parentid>
      <timestamp>2022-10-28T11:41:10Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89153</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="25939" sha1="43ukwc81t3zrfczoldxhcmq41h24v6k" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;__NOTOC__
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

= Details =

== {{project_name_long}} Architecture ==

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt;
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

== Full Spectrum Anti-Tracking Protection ==
Hiding your identity is harder than just hiding your IP. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

== {{project_name_long}} User Groups ==

{{LeftRightImageText
|image=Spy.jpg
|imageright=1
|text=
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes, but is not limited to:
}}

* Investigators and whistleblowers whose work threatens the powerful.
** Within an isolated environment, research and evidence can be gathered without accidental exposure.
* Researchers, government officials or business-people who may be targets of espionage.
** Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
* Journalists who endanger themselves and their families by reporting on organized crime.
** Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
* Political activists under targeted surveillance and attack.
** The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
* Average computer users in a repressive or censored environment.
** Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
* Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed.
** {{project_name_long}} does not silently upload identifying information in the background.

See also [[Users_of_Whonix|Users of {{project name long}}]].
















= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].

This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;
Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network.

{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.





{{project_name_long}} aims to preserve privacy and anonymity by helping [[Users_of_Whonix|users]] run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


== Footnotes ==

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>43ukwc81t3zrfczoldxhcmq41h24v6k</sha1>
    </revision>
    <revision>
      <id>89154</id>
      <parentid>89153</parentid>
      <timestamp>2022-10-28T11:41:32Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89154</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="25985" sha1="2xpm2iwcozcg0ehhqi3g1ijc1t3sddi" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;__NOTOC__
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

= Details =

== {{project_name_long}} Architecture ==

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt;
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

== Full Spectrum Anti-Tracking Protection ==
Hiding your identity is harder than just hiding your IP. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

== {{project_name_long}} User Groups ==

{{LeftRightImageText
|image=Spy.jpg
|imageright=1
|text=
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes, but is not limited to:
}}

* Investigators and whistleblowers whose work threatens the powerful.
** Within an isolated environment, research and evidence can be gathered without accidental exposure.
* Researchers, government officials or business-people who may be targets of espionage.
** Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
* Journalists who endanger themselves and their families by reporting on organized crime.
** Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
* Political activists under targeted surveillance and attack.
** The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
* Average computer users in a repressive or censored environment.
** Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
* Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed.
** {{project_name_long}} does not silently upload identifying information in the background.

See also [[Users_of_Whonix|Users of {{project name long}}]].
















= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].

This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;
Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network.

{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.





{{project_name_long}} aims to preserve privacy and anonymity by helping [[Users_of_Whonix|users]] run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete &lt;u&gt;o&lt;/u&gt;perating &lt;u&gt;s&lt;/u&gt;ystem (OS) with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


== Footnotes ==

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>2xpm2iwcozcg0ehhqi3g1ijc1t3sddi</sha1>
    </revision>
    <revision>
      <id>89155</id>
      <parentid>89154</parentid>
      <timestamp>2022-10-28T11:45:17Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89155</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26107" sha1="92bgiq8gqifia88tno1wozc5sui8bwo" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;__NOTOC__
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

= Details =

Now we're diving deep into what makes {{project_name_long}} great. We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

= Introduction =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network.

This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

{{project_name_long}} aims to preserve privacy and anonymity by helping [[Users_of_Whonix|users]] run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete {{os}} with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

== {{project_name_long}} Architecture ==

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt;
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

== Full Spectrum Anti-Tracking Protection ==
Hiding your identity is harder than just hiding your IP. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

== {{project_name_long}} User Groups ==

{{LeftRightImageText
|image=Spy.jpg
|imageright=1
|text=
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes, but is not limited to:
}}

* Investigators and whistleblowers whose work threatens the powerful.
** Within an isolated environment, research and evidence can be gathered without accidental exposure.
* Researchers, government officials or business-people who may be targets of espionage.
** Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
* Journalists who endanger themselves and their families by reporting on organized crime.
** Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
* Political activists under targeted surveillance and attack.
** The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
* Average computer users in a repressive or censored environment.
** Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
* Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed.
** {{project_name_long}} does not silently upload identifying information in the background.

See also [[Users_of_Whonix|Users of {{project name long}}]].


















= Security by Isolation =
{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

= Online Anonymity via Tor =
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Based on Debian =
[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= {{project_name_short}} Version =
[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =
Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =
* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


== Footnotes ==

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =
{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>92bgiq8gqifia88tno1wozc5sui8bwo</sha1>
    </revision>
    <revision>
      <id>89156</id>
      <parentid>89155</parentid>
      <timestamp>2022-10-28T11:49:13Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89156</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26088" sha1="m0slapablavdib7m8j2c814li2ph270" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;__NOTOC__
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

= Details =

Now we're diving deep into what makes {{project_name_long}} great. We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

== Introduction ==

[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|100px]]
[[File:Debian.png|thumb|100px|Debian logo]]
[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network.

This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

{{project_name_long}} aims to preserve privacy and anonymity by helping [[Users_of_Whonix|users]] run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete {{os}} with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

== {{project_name_long}} User Groups ==

{{LeftRightImageText
|image=Spy.jpg
|imageright=1
|text=
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes, but is not limited to:
}}

* Investigators and whistleblowers whose work threatens the powerful.
** Within an isolated environment, research and evidence can be gathered without accidental exposure.
* Researchers, government officials or business-people who may be targets of espionage.
** Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
* Journalists who endanger themselves and their families by reporting on organized crime.
** Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
* Political activists under targeted surveillance and attack.
** The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
* Average computer users in a repressive or censored environment.
** Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
* Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed.
** {{project_name_long}} does not silently upload identifying information in the background.

See also [[Users_of_Whonix|Users of {{project name long}}]].

== {{project_name_long}} Architecture ==

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt;
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

== Full Spectrum Anti-Tracking Protection ==
Hiding your identity is harder than just hiding your IP. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Security by Isolation ==

{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

== Based on Debian ==

[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

== {{project_name_short}} Version ==

[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

== Release Schedule ==

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

== Summary ==

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

== Support Schedule ==
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

== Next Steps ==

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

== See Also ==

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


== Footnotes ==

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

== License ==

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>m0slapablavdib7m8j2c814li2ph270</sha1>
    </revision>
    <revision>
      <id>89157</id>
      <parentid>89156</parentid>
      <timestamp>2022-10-28T12:07:58Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89157</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26091" sha1="a9oopiqd81338wmn8gyvkdc3mwlgt11" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;__NOTOC__
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

= Details =

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

== Introduction ==

[[File:Whonix-logo-rectangle.png|thumb|150px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|150px]]
[[File:Debian.png|thumb|150px|Debian logo]]
[[File:Tor-logo.png|thumb|150px|Tor logo]]
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network.

This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

{{project_name_long}} aims to preserve privacy and anonymity by helping [[Users_of_Whonix|users]] run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete {{os}} with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

== {{project_name_long}} User Groups ==

[[File:Preview-user-groups.jpg|thumb|300px]]

The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.



== {{project_name_long}} Architecture ==

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt;
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

== Full Spectrum Anti-Tracking Protection ==
Hiding your identity is harder than just hiding your IP. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Security by Isolation ==

{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

== Based on Debian ==

[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

== {{project_name_short}} Version ==

[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

== Release Schedule ==

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

== Summary ==

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

== Support Schedule ==
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

== Next Steps ==

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

== See Also ==

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


== Footnotes ==

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

== License ==

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>a9oopiqd81338wmn8gyvkdc3mwlgt11</sha1>
    </revision>
    <revision>
      <id>89158</id>
      <parentid>89157</parentid>
      <timestamp>2022-10-28T12:09:22Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89158</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26091" sha1="4if1x5nr08b7s1lel5hqk8h2vubekk6" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;__NOTOC__
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

= Details =

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

== Introduction ==

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network.

This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

{{project_name_long}} aims to preserve privacy and anonymity by helping [[Users_of_Whonix|users]] run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete {{os}} with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

== {{project_name_long}} User Groups ==

[[File:Preview-user-groups.jpg|thumb|400px]]

The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.



== {{project_name_long}} Architecture ==

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt;
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

== Full Spectrum Anti-Tracking Protection ==
Hiding your identity is harder than just hiding your IP. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Security by Isolation ==

{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

== Based on Debian ==

[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

== {{project_name_short}} Version ==

[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

== Release Schedule ==

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

== Summary ==

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

== Support Schedule ==
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

== Next Steps ==

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

== See Also ==

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


== Footnotes ==

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

== License ==

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>4if1x5nr08b7s1lel5hqk8h2vubekk6</sha1>
    </revision>
    <revision>
      <id>89159</id>
      <parentid>89158</parentid>
      <timestamp>2022-10-28T12:09:59Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89159</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26121" sha1="7nea57vq6e87u5ln0qotn2v2965sk20" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;__NOTOC__
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;div class="info-box"&gt;
= Details =

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.
&lt;/div&gt;

== Introduction ==

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network.

This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

{{project_name_long}} aims to preserve privacy and anonymity by helping [[Users_of_Whonix|users]] run applications anonymously. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is a complete {{os}} with [https://www.whonix.org/#features additional, advanced security and anonymity features]. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS. ([[Host_Operating_System_Selection|Host Operating System Selection]])

The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

== {{project_name_long}} User Groups ==

[[File:Preview-user-groups.jpg|thumb|400px]]

The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.



== {{project_name_long}} Architecture ==

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt;
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

== Full Spectrum Anti-Tracking Protection ==
Hiding your identity is harder than just hiding your IP. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Security by Isolation ==

{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

== Based on Debian ==

[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

== {{project_name_short}} Version ==

[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

== Release Schedule ==

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

== Summary ==

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

== Support Schedule ==
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

== Next Steps ==

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

== See Also ==

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


== Footnotes ==

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

== License ==

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>7nea57vq6e87u5ln0qotn2v2965sk20</sha1>
    </revision>
    <revision>
      <id>89160</id>
      <parentid>89159</parentid>
      <timestamp>2022-10-28T12:15:50Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89160</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="25925" sha1="ftkfwz6fp6a0uh2p51t0jec0ofspoau" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;__NOTOC__
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;div class="info-box"&gt;
= Details =

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.
&lt;/div&gt;

== Introduction ==

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

== {{project_name_long}} User Groups ==

[[File:Preview-user-groups.jpg|thumb|400px]]

The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.



== {{project_name_long}} Architecture ==

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt;
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

== Full Spectrum Anti-Tracking Protection ==
Hiding your identity is harder than just hiding your IP. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Security by Isolation ==

{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

== Based on Debian ==

[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

== {{project_name_short}} Version ==

[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

== Release Schedule ==

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

== Summary ==

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

== Support Schedule ==
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

== Next Steps ==

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

== See Also ==

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


== Footnotes ==

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

== License ==

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>ftkfwz6fp6a0uh2p51t0jec0ofspoau</sha1>
    </revision>
    <revision>
      <id>89161</id>
      <parentid>89160</parentid>
      <timestamp>2022-10-28T12:17:33Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89161</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="25914" sha1="3jjvftawqg12i470fgyltpsdcdj78gh" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;__NOTOC__
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

----

= Details =

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

== Introduction ==

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

== {{project_name_long}} User Groups ==

[[File:Preview-user-groups.jpg|thumb|400px]]

The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.



== {{project_name_long}} Architecture ==

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Security by Isolation ==

{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

== Based on Debian ==

[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

== {{project_name_short}} Version ==

[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

== Release Schedule ==

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

== Summary ==

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

== Support Schedule ==
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

== Next Steps ==

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

== See Also ==

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


== Footnotes ==

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

== License ==

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>3jjvftawqg12i470fgyltpsdcdj78gh</sha1>
    </revision>
    <revision>
      <id>89162</id>
      <parentid>89161</parentid>
      <timestamp>2022-10-28T12:18:12Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89162</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="25955" sha1="l0yjnaf9s46bj0uv9lnlgtk5k8bdaty" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;__NOTOC__
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;hr class="margin-bottom-30 margin-top-30" /&gt;

= Details =

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

== Introduction ==

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

== {{project_name_long}} User Groups ==

[[File:Preview-user-groups.jpg|thumb|400px]]

The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.



== {{project_name_long}} Architecture ==

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Security by Isolation ==

{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

== Based on Debian ==

[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

== {{project_name_short}} Version ==

[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

== Release Schedule ==

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

== Summary ==

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

== Support Schedule ==
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

== Next Steps ==

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

== See Also ==

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


== Footnotes ==

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

== License ==

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>l0yjnaf9s46bj0uv9lnlgtk5k8bdaty</sha1>
    </revision>
    <revision>
      <id>89163</id>
      <parentid>89162</parentid>
      <timestamp>2022-10-28T12:19:09Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89163</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26001" sha1="nqq3dwdt0c8sk7f1fv2aasks6r38xrv" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;__NOTOC__
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;hr class="margin-bottom-30 margin-top-30" /&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

= Details =

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

== Introduction ==

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

== {{project_name_long}} User Groups ==

[[File:Preview-user-groups.jpg|thumb|400px]]

The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.



== {{project_name_long}} Architecture ==

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Security by Isolation ==

{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

== Based on Debian ==

[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

== {{project_name_short}} Version ==

[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

== Release Schedule ==

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

== Summary ==

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

== Support Schedule ==
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

== Next Steps ==

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

== See Also ==

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


== Footnotes ==

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

== License ==

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>nqq3dwdt0c8sk7f1fv2aasks6r38xrv</sha1>
    </revision>
    <revision>
      <id>89164</id>
      <parentid>89163</parentid>
      <timestamp>2022-10-28T12:21:51Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89164</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="25993" sha1="5rx946tsantblpvlfa02hbzlccagq32" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;hr class="margin-bottom-30 margin-top-30" /&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

= Details =

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px]]

The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.



= {{project_name_long}} Architecture =

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Security by Isolation ==

{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

== Based on Debian ==

[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>5rx946tsantblpvlfa02hbzlccagq32</sha1>
    </revision>
    <revision>
      <id>89165</id>
      <parentid>89164</parentid>
      <timestamp>2022-10-28T12:23:33Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89165</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="25939" sha1="odfrdw7fcod9ts44ac3n5t3vi2srfxz" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px]]

The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.



= {{project_name_long}} Architecture =

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Security by Isolation ==

{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

== Based on Debian ==

[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>odfrdw7fcod9ts44ac3n5t3vi2srfxz</sha1>
    </revision>
    <revision>
      <id>89166</id>
      <parentid>89165</parentid>
      <timestamp>2022-10-28T12:24:08Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89166</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="25971" sha1="tpl9okuhev64xbpdboxuohff888wq5n" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px]]

The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.



= {{project_name_long}} Architecture =

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Security by Isolation ==

{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

== Based on Debian ==

[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>tpl9okuhev64xbpdboxuohff888wq5n</sha1>
    </revision>
    <revision>
      <id>89167</id>
      <parentid>89166</parentid>
      <timestamp>2022-10-28T12:25:00Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89167</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="25957" sha1="cgkdwe4z1xt8jk9e3vijrpi932e7rlb" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-30"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px]]

The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.



= {{project_name_long}} Architecture =

{{Anchor|architecture}}

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|text=
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].
}}

= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Security by Isolation ==

{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

== Based on Debian ==

[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>cgkdwe4z1xt8jk9e3vijrpi932e7rlb</sha1>
    </revision>
    <revision>
      <id>89168</id>
      <parentid>89167</parentid>
      <timestamp>2022-10-28T12:26:29Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89168</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="25973" sha1="nmjv4xgmzuvrkwisl4bd2ptxfwy6mfu" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-30"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px]]

'''Privacy is a human right'''. The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.



= {{project_name_long}} Architecture =

{{Anchor|architecture}}

[[File:{{project_name_short}}-concept-detailed.jpg|thumb|400px]]
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].


= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Security by Isolation ==

{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address.

{{project_name_long}} protects from leaks. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind.

In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

{{project_name_long}} is divided into two VMs:

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]. In over a [[History|decade]], no leaks were ever discovered.

Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

== Based on Debian ==

[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>nmjv4xgmzuvrkwisl4bd2ptxfwy6mfu</sha1>
    </revision>
    <revision>
      <id>89184</id>
      <parentid>89168</parentid>
      <timestamp>2022-10-28T12:31:34Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89184</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26012" sha1="g10t373g9yf1c541ym0bcseahv3rv1o" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-30"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px]]

'''Privacy is a human right'''. The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.



= {{project_name_long}} Architecture =

{{Anchor|architecture}}

[[File:{{project_name_short}}-concept-detailed.jpg|thumb|400px]]
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].


= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Security by Isolation ==

'''{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address, because {{project_name_long}} protects from leaks'''. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

'''Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications''' so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind. Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

'''In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible'''. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

'''{{project_name_long}} is divided into two VMs'':
* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

'''This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.'''

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

'''This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]'''. In over a [[History|decade]], no leaks were ever discovered. Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

== Based on Debian ==

[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>g10t373g9yf1c541ym0bcseahv3rv1o</sha1>
    </revision>
    <revision>
      <id>89185</id>
      <parentid>89184</parentid>
      <timestamp>2022-10-28T12:33:03Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>89185</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26033" sha1="c5aeotkdwmw8wpw591e14526ainnbnc" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{hide_all_banners}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-30"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px]]

'''Privacy is a human right'''. The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.



= {{project_name_long}} Architecture =

{{Anchor|architecture}}

[[File:{{project_name_short}}-concept-detailed.jpg|thumb|400px]]
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].


= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Security by Isolation ==

'''{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address, because {{project_name_long}} protects from leaks'''. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

'''Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications''' so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind. Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

'''In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible'''. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

'''{{project_name_long}} is divided into two VMs'':
* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

'''This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.'''

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

'''This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]'''. In over a [[History|decade]], no leaks were ever discovered. Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

== Based on Debian ==

[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>c5aeotkdwmw8wpw591e14526ainnbnc</sha1>
    </revision>
    <revision>
      <id>89189</id>
      <parentid>89185</parentid>
      <timestamp>2022-10-28T12:35:08Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* {{project_name_long}} User Groups */</comment>
      <origin>89189</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26051" sha1="o3zm8p2pma83eoztf1gfxm7j6jt4y3l" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{hide_all_banners}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-30"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px|[[Users of Whonix]]]]

'''Privacy is a human right'''. The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.

= {{project_name_long}} Architecture =

{{Anchor|architecture}}

[[File:{{project_name_short}}-concept-detailed.jpg|thumb|400px]]
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].


= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Security by Isolation ==

'''{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address, because {{project_name_long}} protects from leaks'''. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

'''Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications''' so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind. Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

'''In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible'''. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

'''{{project_name_long}} is divided into two VMs'':
* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

'''This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.'''

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

'''This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]'''. In over a [[History|decade]], no leaks were ever discovered. Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

== Based on Debian ==

[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>o3zm8p2pma83eoztf1gfxm7j6jt4y3l</sha1>
    </revision>
    <revision>
      <id>89190</id>
      <parentid>89189</parentid>
      <timestamp>2022-10-28T12:35:49Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>Undo revision 89189 by [[Special:Contributions/Patrick|Patrick]] ([[User talk:Patrick|talk]])</comment>
      <origin>89190</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26033" sha1="c5aeotkdwmw8wpw591e14526ainnbnc" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{hide_all_banners}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-30"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px]]

'''Privacy is a human right'''. The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.



= {{project_name_long}} Architecture =

{{Anchor|architecture}}

[[File:{{project_name_short}}-concept-detailed.jpg|thumb|400px]]
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].


= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Security by Isolation ==

'''{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address, because {{project_name_long}} protects from leaks'''. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

'''Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications''' so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind. Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

'''In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible'''. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

'''{{project_name_long}} is divided into two VMs'':
* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

'''This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.'''

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

'''This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]'''. In over a [[History|decade]], no leaks were ever discovered. Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

== Based on Debian ==

[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|100px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>c5aeotkdwmw8wpw591e14526ainnbnc</sha1>
    </revision>
    <revision>
      <id>89191</id>
      <parentid>89190</parentid>
      <timestamp>2022-10-28T12:49:13Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <comment>/* {{project_name_short}} Version */</comment>
      <origin>89191</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26033" sha1="crt8rq461m3fc0avj59qot3188bwa33" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{hide_all_banners}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-30"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px]]

'''Privacy is a human right'''. The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.



= {{project_name_long}} Architecture =

{{Anchor|architecture}}

[[File:{{project_name_short}}-concept-detailed.jpg|thumb|400px]]
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].


= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Security by Isolation ==

'''{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address, because {{project_name_long}} protects from leaks'''. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

'''Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications''' so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind. Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

'''In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible'''. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

'''{{project_name_long}} is divided into two VMs'':
* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

'''This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.'''

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

'''This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]'''. In over a [[History|decade]], no leaks were ever discovered. Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

== Based on Debian ==

[[File:Debian.png|thumb|100px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>crt8rq461m3fc0avj59qot3188bwa33</sha1>
    </revision>
    <revision>
      <id>89192</id>
      <parentid>89191</parentid>
      <timestamp>2022-10-28T12:49:36Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <comment>/* Based on Debian */</comment>
      <origin>89192</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26033" sha1="m5hrt76teyhlhxb5u0vohe3lkcstv2w" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{hide_all_banners}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-30"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px]]

'''Privacy is a human right'''. The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.



= {{project_name_long}} Architecture =

{{Anchor|architecture}}

[[File:{{project_name_short}}-concept-detailed.jpg|thumb|400px]]
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].


= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Security by Isolation ==

'''{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address, because {{project_name_long}} protects from leaks'''. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

'''Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications''' so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind. Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

'''In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible'''. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

'''{{project_name_long}} is divided into two VMs'':
* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

'''This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.'''

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

'''This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]'''. In over a [[History|decade]], no leaks were ever discovered. Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

== Based on Debian ==

[[File:Debian.png|thumb|130px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>m5hrt76teyhlhxb5u0vohe3lkcstv2w</sha1>
    </revision>
    <revision>
      <id>89193</id>
      <parentid>89192</parentid>
      <timestamp>2022-10-28T12:50:05Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <comment>/* Based on Debian */</comment>
      <origin>89193</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="25903" sha1="d5x3a7f859p6vzc9zeicumhrym8cwir" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{hide_all_banners}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-30"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px]]

'''Privacy is a human right'''. The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.



= {{project_name_long}} Architecture =

{{Anchor|architecture}}

[[File:{{project_name_short}}-concept-detailed.jpg|thumb|400px]]
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].


= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Security by Isolation ==

'''{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address, because {{project_name_long}} protects from leaks'''. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

'''Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications''' so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind. Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

'''In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible'''. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

'''{{project_name_long}} is divided into two VMs'':
* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

'''This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.'''

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

'''This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]'''. In over a [[History|decade]], no leaks were ever discovered. Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>d5x3a7f859p6vzc9zeicumhrym8cwir</sha1>
    </revision>
    <revision>
      <id>89194</id>
      <parentid>89193</parentid>
      <timestamp>2022-10-28T12:50:37Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <comment>/* Security by Isolation */</comment>
      <origin>89194</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26034" sha1="jl8i0tgaywf1xi9hodkcwjes93v31o3" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{hide_all_banners}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-30"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px]]

'''Privacy is a human right'''. The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.



= {{project_name_long}} Architecture =

{{Anchor|architecture}}

[[File:{{project_name_short}}-concept-detailed.jpg|thumb|400px]]
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].


= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Based on Debian ==

[[File:Debian.png|thumb|130px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}


== Security by Isolation ==

'''{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address, because {{project_name_long}} protects from leaks'''. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

'''Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications''' so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind. Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

'''In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible'''. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

'''{{project_name_long}} is divided into two VMs'':
* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

'''This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.'''

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

'''This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]'''. In over a [[History|decade]], no leaks were ever discovered. Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>jl8i0tgaywf1xi9hodkcwjes93v31o3</sha1>
    </revision>
    <revision>
      <id>89195</id>
      <parentid>89194</parentid>
      <timestamp>2022-10-28T12:50:47Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <comment>/* Based on Debian */</comment>
      <origin>89195</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26033" sha1="f3zx2z2m4fb0bv8oxu3yxufo1cbtzh3" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{hide_all_banners}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-30"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px]]

'''Privacy is a human right'''. The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.



= {{project_name_long}} Architecture =

{{Anchor|architecture}}

[[File:{{project_name_short}}-concept-detailed.jpg|thumb|400px]]
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].


= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Based on Debian ==

[[File:Debian.png|thumb|130px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

== Security by Isolation ==

'''{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address, because {{project_name_long}} protects from leaks'''. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

'''Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications''' so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind. Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

'''In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible'''. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

'''{{project_name_long}} is divided into two VMs'':
* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

'''This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.'''

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

'''This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]'''. In over a [[History|decade]], no leaks were ever discovered. Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|100px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>f3zx2z2m4fb0bv8oxu3yxufo1cbtzh3</sha1>
    </revision>
    <revision>
      <id>89196</id>
      <parentid>89195</parentid>
      <timestamp>2022-10-28T12:51:56Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <comment>/* Online Anonymity via Tor */</comment>
      <origin>89196</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26033" sha1="5v6ja7du9hgetflqkdm6k911y35pvo7" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{hide_all_banners}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-30"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px]]

'''Privacy is a human right'''. The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.



= {{project_name_long}} Architecture =

{{Anchor|architecture}}

[[File:{{project_name_short}}-concept-detailed.jpg|thumb|400px]]
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].


= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Based on Debian ==

[[File:Debian.png|thumb|130px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

== Security by Isolation ==

'''{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address, because {{project_name_long}} protects from leaks'''. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

'''Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications''' so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind. Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

'''In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible'''. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

'''{{project_name_long}} is divided into two VMs'':
* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

'''This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.'''

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

'''This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]'''. In over a [[History|decade]], no leaks were ever discovered. Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|130px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>5v6ja7du9hgetflqkdm6k911y35pvo7</sha1>
    </revision>
    <revision>
      <id>89199</id>
      <parentid>89196</parentid>
      <timestamp>2022-10-28T13:19:21Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>89199</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26054" sha1="80urlxki742b6a7zrpp41j66v4vdyoh" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{hide_all_banners}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-30"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px|link=Users_of_Whonix]]

'''Privacy is a human right'''. The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.



= {{project_name_long}} Architecture =

{{Anchor|architecture}}

[[File:{{project_name_short}}-concept-detailed.jpg|thumb|400px]]
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

To learn more about {{project_name_long}} see [[About]] and [[Features]].


= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Based on Debian ==

[[File:Debian.png|thumb|130px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

== Security by Isolation ==

'''{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address, because {{project_name_long}} protects from leaks'''. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

'''Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications''' so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind. Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

'''In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible'''. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

'''{{project_name_long}} is divided into two VMs'':
* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

'''This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.'''

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

'''This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]'''. In over a [[History|decade]], no leaks were ever discovered. Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|130px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>80urlxki742b6a7zrpp41j66v4vdyoh</sha1>
    </revision>
    <revision>
      <id>89200</id>
      <parentid>89199</parentid>
      <timestamp>2022-10-28T13:22:49Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* {{project_name_long}} Architecture */</comment>
      <origin>89200</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="25978" sha1="40dccxg25xtay8gc94h9gwvis65ezow" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{hide_all_banners}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-30"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px|link=Users_of_Whonix]]

'''Privacy is a human right'''. The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.



= {{project_name_long}} Architecture =

{{Anchor|architecture}}

[[File:{{project_name_short}}-concept-detailed.jpg|thumb|400px]]
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Based on Debian ==

[[File:Debian.png|thumb|130px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

== Security by Isolation ==

'''{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address, because {{project_name_long}} protects from leaks'''. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

'''Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications''' so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind. Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

'''In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible'''. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

'''{{project_name_long}} is divided into two VMs'':
* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

'''This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.'''

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

'''This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]'''. In over a [[History|decade]], no leaks were ever discovered. Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|130px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>40dccxg25xtay8gc94h9gwvis65ezow</sha1>
    </revision>
    <revision>
      <id>89213</id>
      <parentid>89200</parentid>
      <timestamp>2022-10-29T13:46:41Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* {{project_name_long}} User Groups */</comment>
      <origin>89213</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26027" sha1="9g46z2isbegf22srabfattjg4rdygyw" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{hide_all_banners}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-30"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px|link=Users_of_Whonix|[[Users_of_Whonix|Users of {{project name long}}]]]]

'''Privacy is a human right'''. The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.

= {{project_name_long}} Architecture =

{{Anchor|architecture}}

[[File:{{project_name_short}}-concept-detailed.jpg|thumb|400px]]
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Based on Debian ==

[[File:Debian.png|thumb|130px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

== Security by Isolation ==

'''{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address, because {{project_name_long}} protects from leaks'''. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

'''Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications''' so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind. Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

'''In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible'''. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

'''{{project_name_long}} is divided into two VMs'':
* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

'''This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.'''

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

'''This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]'''. In over a [[History|decade]], no leaks were ever discovered. Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|130px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>9g46z2isbegf22srabfattjg4rdygyw</sha1>
    </revision>
    <revision>
      <id>89226</id>
      <parentid>89213</parentid>
      <timestamp>2022-10-31T13:10:20Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>89226</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26052" sha1="fqv1cirkl2euish27y990f40eoh7xuh" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{hide_all_banners}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|imagelink=wiki/Download
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-30"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px|link=Users_of_Whonix|[[Users_of_Whonix|Users of {{project name long}}]]]]

'''Privacy is a human right'''. The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.

= {{project_name_long}} Architecture =

{{Anchor|architecture}}

[[File:{{project_name_short}}-concept-detailed.jpg|thumb|400px]]
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Based on Debian ==

[[File:Debian.png|thumb|130px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

== Security by Isolation ==

'''{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address, because {{project_name_long}} protects from leaks'''. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

'''Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications''' so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind. Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

'''In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible'''. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

'''{{project_name_long}} is divided into two VMs'':
* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

'''This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.'''

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

'''This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]'''. In over a [[History|decade]], no leaks were ever discovered. Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|130px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>fqv1cirkl2euish27y990f40eoh7xuh</sha1>
    </revision>
    <revision>
      <id>89227</id>
      <parentid>89226</parentid>
      <timestamp>2022-10-31T13:10:54Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>89227</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26090" sha1="pm2v4413b4y728382wh5g6roam36a65" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{hide_all_banners}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|imagelink=wiki/Download
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|imagelink=https://www.kicksecure.com
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-30"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px|link=Users_of_Whonix|[[Users_of_Whonix|Users of {{project name long}}]]]]

'''Privacy is a human right'''. The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.

= {{project_name_long}} Architecture =

{{Anchor|architecture}}

[[File:{{project_name_short}}-concept-detailed.jpg|thumb|400px]]
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Based on Debian ==

[[File:Debian.png|thumb|130px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

== Security by Isolation ==

'''{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address, because {{project_name_long}} protects from leaks'''. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

'''Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications''' so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind. Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

'''In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible'''. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

'''{{project_name_long}} is divided into two VMs'':
* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

'''This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.'''

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

'''This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]'''. In over a [[History|decade]], no leaks were ever discovered. Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|130px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>pm2v4413b4y728382wh5g6roam36a65</sha1>
    </revision>
    <revision>
      <id>89228</id>
      <parentid>89227</parentid>
      <timestamp>2022-10-31T13:11:12Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>89228</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26085" sha1="onwvmsdnjq6dnw1bh6hajbs27wtxkc6" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{hide_all_banners}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|imagelink=Download
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|imagelink=https://www.kicksecure.com
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-30"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px|link=Users_of_Whonix|[[Users_of_Whonix|Users of {{project name long}}]]]]

'''Privacy is a human right'''. The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.

= {{project_name_long}} Architecture =

{{Anchor|architecture}}

[[File:{{project_name_short}}-concept-detailed.jpg|thumb|400px]]
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Based on Debian ==

[[File:Debian.png|thumb|130px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

== Security by Isolation ==

'''{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address, because {{project_name_long}} protects from leaks'''. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

'''Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications''' so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind. Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

'''In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible'''. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

'''{{project_name_long}} is divided into two VMs'':
* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

'''This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.'''

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

'''This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]'''. In over a [[History|decade]], no leaks were ever discovered. Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|130px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>onwvmsdnjq6dnw1bh6hajbs27wtxkc6</sha1>
    </revision>
    <revision>
      <id>89229</id>
      <parentid>89228</parentid>
      <timestamp>2022-10-31T13:11:46Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>89229</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26113" sha1="49olh3tevn1r6puzuzddu1iq72ybc5u" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{hide_all_banners}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|imagelink=Download
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|imagelink=https://www.kicksecure.com
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|imagelink=/Users_of_Whonix
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-30"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px|link=Users_of_Whonix|[[Users_of_Whonix|Users of {{project name long}}]]]]

'''Privacy is a human right'''. The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.

= {{project_name_long}} Architecture =

{{Anchor|architecture}}

[[File:{{project_name_short}}-concept-detailed.jpg|thumb|400px]]
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Based on Debian ==

[[File:Debian.png|thumb|130px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

== Security by Isolation ==

'''{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address, because {{project_name_long}} protects from leaks'''. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

'''Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications''' so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind. Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

'''In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible'''. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

'''{{project_name_long}} is divided into two VMs'':
* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

'''This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.'''

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

'''This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]'''. In over a [[History|decade]], no leaks were ever discovered. Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|130px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>49olh3tevn1r6puzuzddu1iq72ybc5u</sha1>
    </revision>
    <revision>
      <id>89230</id>
      <parentid>89229</parentid>
      <timestamp>2022-10-31T13:12:45Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* {{project_name_long}} Architecture */</comment>
      <origin>89230</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26148" sha1="smsmnj0sfj5dnb9mgop4yt25uhjrzer" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{hide_all_banners}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|imagelink=Download
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|imagelink=https://www.kicksecure.com
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|imagelink=/Users_of_Whonix
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-30"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px|link=Users_of_Whonix|[[Users_of_Whonix|Users of {{project name long}}]]]]

'''Privacy is a human right'''. The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.

= {{project_name_long}} Architecture =

{{Anchor|architecture}}

[[File:{{project_name_short}}-concept-detailed.jpg|thumb|400px|{{project name long}} Architecture]]
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Based on Debian ==

[[File:Debian.png|thumb|130px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

== Security by Isolation ==

'''{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address, because {{project_name_long}} protects from leaks'''. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

'''Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications''' so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind. Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

'''In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible'''. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

'''{{project_name_long}} is divided into two VMs'':
* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

'''This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.'''

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

'''This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]'''. In over a [[History|decade]], no leaks were ever discovered. Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|130px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]


= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>smsmnj0sfj5dnb9mgop4yt25uhjrzer</sha1>
    </revision>
    <revision>
      <id>89231</id>
      <parentid>89230</parentid>
      <timestamp>2022-10-31T13:13:43Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* See Also */</comment>
      <origin>89231</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26147" sha1="rdtuv8eaa6ghdj70py4va8nbhlbvm4q" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{hide_all_banners}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|imagelink=Download
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|imagelink=https://www.kicksecure.com
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|imagelink=/Users_of_Whonix
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-30"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px|link=Users_of_Whonix|[[Users_of_Whonix|Users of {{project name long}}]]]]

'''Privacy is a human right'''. The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.

= {{project_name_long}} Architecture =

{{Anchor|architecture}}

[[File:{{project_name_short}}-concept-detailed.jpg|thumb|400px|{{project name long}} Architecture]]
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Based on Debian ==

[[File:Debian.png|thumb|130px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

== Security by Isolation ==

'''{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address, because {{project_name_long}} protects from leaks'''. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

'''Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications''' so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind. Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

'''In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible'''. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

'''{{project_name_long}} is divided into two VMs'':
* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

'''This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.'''

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

'''This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]'''. In over a [[History|decade]], no leaks were ever discovered. Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|130px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>rdtuv8eaa6ghdj70py4va8nbhlbvm4q</sha1>
    </revision>
    <revision>
      <id>89248</id>
      <parentid>89231</parentid>
      <timestamp>2022-11-01T08:39:09Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>89248</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26146" sha1="8hcl0klfbd51xljgikclkjqn4rl3fkt" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{hide_all_banners}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|imagelink=Download
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|imagelink=https://www.kicksecure.com
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|imagelink=Users_of_Whonix
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-30"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#features advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px|link=Users_of_Whonix|[[Users_of_Whonix|Users of {{project name long}}]]]]

'''Privacy is a human right'''. The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.

= {{project_name_long}} Architecture =

{{Anchor|architecture}}

[[File:{{project_name_short}}-concept-detailed.jpg|thumb|400px|{{project name long}} Architecture]]
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Based on Debian ==

[[File:Debian.png|thumb|130px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

== Security by Isolation ==

'''{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address, because {{project_name_long}} protects from leaks'''. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

'''Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications''' so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind. Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

'''In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible'''. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

'''{{project_name_long}} is divided into two VMs'':
* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

'''This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.'''

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

'''This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]'''. In over a [[History|decade]], no leaks were ever discovered. Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|130px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>8hcl0klfbd51xljgikclkjqn4rl3fkt</sha1>
    </revision>
    <revision>
      <id>89491</id>
      <parentid>89248</parentid>
      <timestamp>2022-11-15T18:57:44Z</timestamp>
      <contributor>
        <username>Wiki-import</username>
        <id>5022</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "https://www.whonix.org/#features" to "https://www.whonix.org/#security"</comment>
      <origin>89491</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26146" sha1="e8y1ojrugg7q838b62j9b5dwn6c833w" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{hide_all_banners}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|imagelink=Download
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#security advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|imagelink=https://www.kicksecure.com
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|imagelink=Users_of_Whonix
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-30"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#security advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px|link=Users_of_Whonix|[[Users_of_Whonix|Users of {{project name long}}]]]]

'''Privacy is a human right'''. The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.

= {{project_name_long}} Architecture =

{{Anchor|architecture}}

[[File:{{project_name_short}}-concept-detailed.jpg|thumb|400px|{{project name long}} Architecture]]
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Based on Debian ==

[[File:Debian.png|thumb|130px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

== Security by Isolation ==

'''{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address, because {{project_name_long}} protects from leaks'''. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

'''Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications''' so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind. Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

'''In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible'''. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

'''{{project_name_long}} is divided into two VMs'':
* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

'''This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.'''

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

'''This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]'''. In over a [[History|decade]], no leaks were ever discovered. Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|130px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>e8y1ojrugg7q838b62j9b5dwn6c833w</sha1>
    </revision>
    <revision>
      <id>90670</id>
      <parentid>89491</parentid>
      <timestamp>2022-12-04T09:56:01Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <comment>/* Introduction */</comment>
      <origin>90670</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26171" sha1="7f1wzfqfgfqd6noogr71p1q5zhd3lvn" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{hide_all_banners}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|imagelink=Download
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#security advanced security and privacy]. It's based on the Tor anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|imagelink=https://www.kicksecure.com
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|imagelink=Users_of_Whonix
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-30"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#security advanced security and privacy]. It's based on the [https://torproject.org Tor] anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px|link=Users_of_Whonix|[[Users_of_Whonix|Users of {{project name long}}]]]]

'''Privacy is a human right'''. The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.

= {{project_name_long}} Architecture =

{{Anchor|architecture}}

[[File:{{project_name_short}}-concept-detailed.jpg|thumb|400px|{{project name long}} Architecture]]
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Based on Debian ==

[[File:Debian.png|thumb|130px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

== Security by Isolation ==

'''{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address, because {{project_name_long}} protects from leaks'''. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

'''Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications''' so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind. Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

'''In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible'''. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

'''{{project_name_long}} is divided into two VMs'':
* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

'''This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.'''

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

'''This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]'''. In over a [[History|decade]], no leaks were ever discovered. Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|130px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>7f1wzfqfgfqd6noogr71p1q5zhd3lvn</sha1>
    </revision>
    <revision>
      <id>90671</id>
      <parentid>90670</parentid>
      <timestamp>2022-12-04T10:50:21Z</timestamp>
      <contributor>
        <username>MintM</username>
        <id>5232</id>
      </contributor>
      <minor/>
      <comment>Added ext. link to Tor anonymity network twice (to keep the # of links relevant and limited), as per introduction for people not yet familiar with the term.</comment>
      <origin>90671</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26196" sha1="tmrovuuumtytr5ylixw52aqgxews9no" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{hide_all_banners}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|imagelink=Download
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#security advanced security and privacy]. It's based on the [https://torproject.org Tor] anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|imagelink=https://www.kicksecure.com
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|imagelink=Users_of_Whonix
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-30"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#security advanced security and privacy]. It's based on the [https://torproject.org Tor] anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Security_in_Real_World|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px|link=Users_of_Whonix|[[Users_of_Whonix|Users of {{project name long}}]]]]

'''Privacy is a human right'''. The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.

= {{project_name_long}} Architecture =

{{Anchor|architecture}}

[[File:{{project_name_short}}-concept-detailed.jpg|thumb|400px|{{project name long}} Architecture]]
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Based on Debian ==

[[File:Debian.png|thumb|130px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

== Security by Isolation ==

'''{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address, because {{project_name_long}} protects from leaks'''. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

'''Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications''' so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind. Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Security_in_Real_World#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

'''In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible'''. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

'''{{project_name_long}} is divided into two VMs'':
* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

'''This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.'''

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

'''This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]'''. In over a [[History|decade]], no leaks were ever discovered. Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|130px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>tmrovuuumtytr5ylixw52aqgxews9no</sha1>
    </revision>
    <revision>
      <id>90741</id>
      <parentid>90671</parentid>
      <timestamp>2022-12-06T14:33:34Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "Security_in_Real_World" to "Whonix_against_Real_Attacks"</comment>
      <origin>90741</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26211" sha1="bh37f8547fryonwh8mlsntd5nde0cw0" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{hide_all_banners}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|imagelink=Download
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#security advanced security and privacy]. It's based on the [https://torproject.org Tor] anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Whonix_against_Real_Attacks|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|imagelink=https://www.kicksecure.com
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|imagelink=Users_of_Whonix
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-30"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#security advanced security and privacy]. It's based on the [https://torproject.org Tor] anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Whonix_against_Real_Attacks|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px|link=Users_of_Whonix|[[Users_of_Whonix|Users of {{project name long}}]]]]

'''Privacy is a human right'''. The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.

= {{project_name_long}} Architecture =

{{Anchor|architecture}}

[[File:{{project_name_short}}-concept-detailed.jpg|thumb|400px|{{project name long}} Architecture]]
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Based on Debian ==

[[File:Debian.png|thumb|130px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

== Security by Isolation ==

'''{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address, because {{project_name_long}} protects from leaks'''. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

'''Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications''' so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind. Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Whonix_against_Real_Attacks#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

'''In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible'''. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

'''{{project_name_long}} is divided into two VMs'':
* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

'''This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.'''

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

'''This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]'''. In over a [[History|decade]], no leaks were ever discovered. Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|130px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Security in Real World|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>bh37f8547fryonwh8mlsntd5nde0cw0</sha1>
    </revision>
    <revision>
      <id>90750</id>
      <parentid>90741</parentid>
      <timestamp>2022-12-06T14:37:54Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "[[Security in Real World|" to "[[Whonix against Real Attacks|"</comment>
      <origin>90750</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26216" sha1="5cbsyd9g9mx6f6u6q9ef9n5xc9fe8m2" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{hide_all_banners}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|imagelink=Download
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#security advanced security and privacy]. It's based on the [https://torproject.org Tor] anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Whonix_against_Real_Attacks|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|imagelink=https://www.kicksecure.com
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|imagelink=Users_of_Whonix
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-30"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#security advanced security and privacy]. It's based on the [https://torproject.org Tor] anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Whonix_against_Real_Attacks|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px|link=Users_of_Whonix|[[Users_of_Whonix|Users of {{project name long}}]]]]

'''Privacy is a human right'''. The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.

= {{project_name_long}} Architecture =

{{Anchor|architecture}}

[[File:{{project_name_short}}-concept-detailed.jpg|thumb|400px|{{project name long}} Architecture]]
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Based on Debian ==

[[File:Debian.png|thumb|130px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

== Security by Isolation ==

'''{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address, because {{project_name_long}} protects from leaks'''. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

'''Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications''' so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind. Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Whonix_against_Real_Attacks#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

'''In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible'''. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

'''{{project_name_long}} is divided into two VMs'':
* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

'''This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.'''

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

'''This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]'''. In over a [[History|decade]], no leaks were ever discovered. Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|130px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Whonix against Real Attacks|Protection against Real World Attacks]]
* [[History|10 years history of success]]

= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>5cbsyd9g9mx6f6u6q9ef9n5xc9fe8m2</sha1>
    </revision>
    <revision>
      <id>90756</id>
      <parentid>90750</parentid>
      <timestamp>2022-12-06T14:39:03Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <minor/>
      <comment>Text replacement - "|Protection against Real World Attacks]]" to "|Whonix Track Record against Real Cyber Attacks]]"</comment>
      <origin>90756</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26225" sha1="qdw1aykw1bzo42drm7edrw109uko8t9" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{hide_all_banners}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|imagelink=Download
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#security advanced security and privacy]. It's based on the [https://torproject.org Tor] anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Whonix_against_Real_Attacks|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|imagelink=https://www.kicksecure.com
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|imagelink=Users_of_Whonix
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-30"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#security advanced security and privacy]. It's based on the [https://torproject.org Tor] anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Whonix_against_Real_Attacks|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px|link=Users_of_Whonix|[[Users_of_Whonix|Users of {{project name long}}]]]]

'''Privacy is a human right'''. The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.

= {{project_name_long}} Architecture =

{{Anchor|architecture}}

[[File:{{project_name_short}}-concept-detailed.jpg|thumb|400px|{{project name long}} Architecture]]
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Based on Debian ==

[[File:Debian.png|thumb|130px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

== Security by Isolation ==

'''{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address, because {{project_name_long}} protects from leaks'''. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

'''Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications''' so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind. Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Whonix_against_Real_Attacks#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

'''In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible'''. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

'''{{project_name_long}} is divided into two VMs'':
* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

'''This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.'''

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

'''This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]'''. In over a [[History|decade]], no leaks were ever discovered. Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|130px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Whonix against Real Attacks|Whonix Track Record against Real Cyber Attacks]]
* [[History|10 years history of success]]

= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>qdw1aykw1bzo42drm7edrw109uko8t9</sha1>
    </revision>
    <revision>
      <id>91849</id>
      <parentid>90756</parentid>
      <timestamp>2023-01-02T15:49:01Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Security by Isolation */</comment>
      <origin>91849</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26224" sha1="0ta07hygo145yxqzw94wfcrbb3gb46m" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{hide_all_banners}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|imagelink=Download
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#security advanced security and privacy]. It's based on the [https://torproject.org Tor] anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Whonix_against_Real_Attacks|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|imagelink=https://www.kicksecure.com
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|imagelink=Users_of_Whonix
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-30"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#security advanced security and privacy]. It's based on the [https://torproject.org Tor] anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Whonix_against_Real_Attacks|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px|link=Users_of_Whonix|[[Users_of_Whonix|Users of {{project name long}}]]]]

'''Privacy is a human right'''. The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.

= {{project_name_long}} Architecture =

{{Anchor|architecture}}

[[File:{{project_name_short}}-concept-detailed.jpg|thumb|400px|{{project name long}} Architecture]]
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Based on Debian ==

[[File:Debian.png|thumb|130px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

== Security by Isolation ==

'''{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address, because {{project_name_long}} protects from leaks'''. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

'''Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications''' so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind. Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Whonix_against_Real_Attacks#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

'''In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible'''. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

''{{project_name_long}} is divided into two VMs'':
* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

'''This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.'''

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

'''This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]'''. In over a [[History|decade]], no leaks were ever discovered. Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|130px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Whonix against Real Attacks|Whonix Track Record against Real Cyber Attacks]]
* [[History|10 years history of success]]

= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>0ta07hygo145yxqzw94wfcrbb3gb46m</sha1>
    </revision>
    <revision>
      <id>91850</id>
      <parentid>91849</parentid>
      <timestamp>2023-01-02T15:49:12Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <comment>/* Security by Isolation */</comment>
      <origin>91850</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26225" sha1="qsvtbfytg97o7uyh1gmh6dlw2wqzvyp" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{hide_all_banners}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|imagelink=Download
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#security advanced security and privacy]. It's based on the [https://torproject.org Tor] anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Whonix_against_Real_Attacks|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|imagelink=https://www.kicksecure.com
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|imagelink=Users_of_Whonix
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-30"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#security advanced security and privacy]. It's based on the [https://torproject.org Tor] anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Whonix_against_Real_Attacks|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px|link=Users_of_Whonix|[[Users_of_Whonix|Users of {{project name long}}]]]]

'''Privacy is a human right'''. The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.

= {{project_name_long}} Architecture =

{{Anchor|architecture}}

[[File:{{project_name_short}}-concept-detailed.jpg|thumb|400px|{{project name long}} Architecture]]
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Based on Debian ==

[[File:Debian.png|thumb|130px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

== Security by Isolation ==

'''{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address, because {{project_name_long}} protects from leaks'''. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

'''Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications''' so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind. Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Whonix_against_Real_Attacks#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

'''In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible'''. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

''{{project_name_long}} is divided into two VMs'':

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

'''This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.'''

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

'''This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]'''. In over a [[History|decade]], no leaks were ever discovered. Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|130px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Whonix against Real Attacks|Whonix Track Record against Real Cyber Attacks]]
* [[History|10 years history of success]]

= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>qsvtbfytg97o7uyh1gmh6dlw2wqzvyp</sha1>
    </revision>
    <revision>
      <id>92064</id>
      <parentid>91850</parentid>
      <timestamp>2023-01-12T18:03:47Z</timestamp>
      <contributor>
        <ip>127.0.0.1</ip>
      </contributor>
      <origin>92064</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="2676" sha1="mybq0a32k6zdfo3750r7t69ddqy8dnm" xml:space="preserve">Christmas is usually a time of overindulgence but this year some are shunning the usual extravagances in favour of more frugal and laid-back festivities.&lt;br&gt;One fifth of us are expected to opt for trendy air fryers rather than ovens to cook Christmas dinner in a bid to cut energy bills as the cost-of-living crisis bites.&lt;br&gt;Air fryers use less than half the energy that an oven requires, so over time they can reduce gas and electricity bills.&lt;br&gt;Those cooking for Christmas will be relieved to hear the appliances can roast green vegetables, potatoes and  custom poultry - including turkey.&lt;br&gt;         Christmas is usually a time of overindulgence but this year some are shunning the usual extravagances in favour of more frugal and laid-back festivities&lt;br&gt;         One fifth of us are expected to opt for trendy air fryers rather than ovens to cook Christmas dinner in a bid to cut energy bills as the cost-of-living crisis bites&lt;br&gt;   RELATED ARTICLES  Previous 1 Next       Gifts 'were stolen by delivery driver and sold at car boot...    Just William - The Christmas Truce: A new rollicking tale...     &lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;br&gt;Share this article&lt;br&gt;Share&lt;br&gt;&lt;br&gt;&lt;br&gt;However, air fryers with capacities of less than 5.7l litres may not be large enough to cook a bird whole.&lt;br&gt;The counter-top machine can also be used as a healthier option because air fryers require significantly less oil.&lt;br&gt;A survey for John Lewis found many of us also plan to dress down this year, with only 9 per cent puting on their festive 'glad rags'.&lt;br&gt;&lt;br&gt;Instead of sequins, velvet, black tie and high heels, this year will see almost half of us - 45 per cent - in relaxed apparel such as pyjamas or jeans on the day.&lt;br&gt;Meanwhile rocketing prices are forcing millions to scale back on lavish details and luxury presents.&lt;br&gt;&lt;br&gt;Four in ten of those cutting back admitted to buying cheaper presents for friends, while one in five are spending less on an office 'Secret Santa'. And many started Christmas shopping earlier than ever this year to spread costs.&lt;br&gt;The study found donations to charity, gifts for pets and treats left for Santa were among the most likely outlays to be axed.&lt;br&gt;However, presents for children were given top priority, closely followed by alcoholic drinks.&lt;br&gt;&lt;br&gt;With the average Christmas dinner costing a third more than in 2021, according to Good Housekeeping, many plan to make further savings by cooking more from scratch.&lt;br&gt;Stuffing, gravy and mince pies are among the most popular elements to prepare at home.&lt;br&gt;&lt;div class="art-ins mol-factbox news" data-version="2" id="mol-829ade30-7f42-11ed-b5d1-2770e98db79c" website an air fryer save on your power bills?</text>
      <sha1>mybq0a32k6zdfo3750r7t69ddqy8dnm</sha1>
    </revision>
    <revision>
      <id>92097</id>
      <parentid>92064</parentid>
      <timestamp>2023-01-13T10:22:40Z</timestamp>
      <contributor>
        <username>Patrick</username>
        <id>2</id>
      </contributor>
      <origin>92097</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26225" sha1="qsvtbfytg97o7uyh1gmh6dlw2wqzvyp" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{hide_all_banners}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|imagelink=Download
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#security advanced security and privacy]. It's based on the [https://torproject.org Tor] anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Whonix_against_Real_Attacks|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|imagelink=https://www.kicksecure.com
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|imagelink=Users_of_Whonix
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-30"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#security advanced security and privacy]. It's based on the [https://torproject.org Tor] anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Whonix_against_Real_Attacks|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px|link=Users_of_Whonix|[[Users_of_Whonix|Users of {{project name long}}]]]]

'''Privacy is a human right'''. The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.

= {{project_name_long}} Architecture =

{{Anchor|architecture}}

[[File:{{project_name_short}}-concept-detailed.jpg|thumb|400px|{{project name long}} Architecture]]
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Based on Debian ==

[[File:Debian.png|thumb|130px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

== Security by Isolation ==

'''{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address, because {{project_name_long}} protects from leaks'''. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

'''Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications''' so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind. Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Whonix_against_Real_Attacks#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

'''In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible'''. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

''{{project_name_long}} is divided into two VMs'':

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

'''This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.'''

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

'''This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]'''. In over a [[History|decade]], no leaks were ever discovered. Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|130px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/torusers.html.en
|text=Who uses Tor?
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/torusers.html.en
}}

= Summary =

'''Table:''' ''{{project_name_long}} Goals, Design and Limitations''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Category'''
! scope="col"| '''Description'''
|-

! scope="row"| {{project_name_long}} is
|
* a free and open operating system
* an anti-censorship tool
* the first step among many in hiding a user's identity
|-

! scope="row"| {{project_name_long}} helps to
|
* disguise a user's IP address
* prevent &lt;u&gt;i&lt;/u&gt;nternet &lt;u&gt;s&lt;/u&gt;ervice &lt;u&gt;p&lt;/u&gt;rovider (ISP) spying
* prevent websites from identifying the user
* prevent malware from identifying the user
* circumvent censorship
|-

! scope="row"| {{project_name_long}} is not
|
* a one-click anonymization solution, since anonymity is a complex behavioral and technical problem in a highly surveilled world &lt;ref&gt;
Readers of the [[Documentation|{{project name long}} documentation]] will quickly learn that one-click anonymization solutions simply &lt;u&gt;do not exist&lt;/u&gt; and will likely never be developed.
&lt;/ref&gt;
|-

|}
&lt;/div&gt;

= {{project_name_short}} Version =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
Each {{project_name_long}} release is based on a particular version of Debian:

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! &lt;u&gt;{{project_name_long}} version&lt;/u&gt; !! ''Debian Version'' !! Debian Codename
|-

| {{project_name_long}} &lt;code&gt;&lt;u&gt;{{VersionNew}}&lt;/u&gt;&lt;/code&gt; || ''&lt;code&gt;{{Stable_project_version_based_on_Debian_version_short}}&lt;/code&gt;'' || [https://www.debian.org/releases/{{Stable project version based on Debian codename}}/ &lt;code&gt;{{Stable project version based on Debian codename}}&lt;/code&gt;]
|-

|}
&lt;/div&gt;

Users can manually check the {{project_name_long}} version at any time by following [[Post_Install_Advice#How_do_I_Check_the_Current_Whonix_.E2.84.A2_Version.3F|this step]].

{{Anchor|Release and Support Schedule}}

= Release Schedule =

Note that {{project_name_long}} does not have a fixed release schedule. A new stable release only becomes available when it is deemed ready. Interested users can query the [[Reporting_Bugs#Issue_Tracker|issue tracker]] &lt;ref&gt;
For example, for the next release use the tag "{{project_name_long}} 16" and status "Open".
&lt;/ref&gt; and [[Release_Notes|release notes]] to track developer progress. [[Stay Tuned]].

= Support Schedule =
=== Debian Hosts ===
'''New Debian Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Debian&lt;/u&gt; is released, {{project_name_long}} VMs may no longer be supported on any older version of Debian. All users need to upgrade the Debian platform promptly after the deprecation notice in order to use {{project_name_long}} safely.

'''New {{project_name_long}} Release'''

&lt;u&gt;One month&lt;/u&gt; after a new stable version of &lt;u&gt;Whonix&lt;/u&gt; is released, older versions will no longer be supported. All users need to upgrade the {{project_name_long}} platform promptly in order to remain safe.

'''Deprecation Notices'''

The deprecation notice is provided at least one month in advance and posted in the [https://forums.{{project_clearnet}}/c/news {{project_name_long}} News forum]. [[Stay Tuned]]! All users need to upgrade the respective platform promptly in order to remain safe. &lt;ref&gt;This also relieves {{project_name_long}} developers from needing to diagnose and support old-stable versions of Qubes/Debian/{{project_name_long}}, which duplicates the maintenance burden.&lt;/ref&gt;

=== Debian-based and Other Hosts ===
As per [[#Debian Hosts|Debian Hosts]].

=== Windows Hosts ===
The support schedule is mostly undefined at present, but likely to mirror [[#Debian Hosts|Debian Hosts]].

=== Qubes Hosts ===
Quote [https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support {{q_project_name}} version support policy]:

&lt;blockquote&gt;{{project_name_long}} templates are supported by our partner, the {{project_name_long}} Project. The {{project_name_long}} Project has set its own support policy for {{project_name_long}} templates in Qubes.

This policy requires {{project_name_long}} template users to stay reasonably close to the cutting edge by upgrading to new stable releases of Qubes OS and {{project_name_long}} templates within a month of their respective releases. To be precise:

* One month after a new stable version of Qubes OS is released, {{project_name_long}} templates will no longer be supported on any older release of Qubes OS. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable Qubes OS release within one month of its release.
* One month after new stable versions of {{project_name_long}} templates are released, older releases of {{project_name_long}} templates will no longer be supported. This means that users who wish to continue using {{project_name_long}} templates on Qubes must always upgrade to the latest stable {{project_name_long}} template releases within one month of their release.

We aim to announce both types of events one month in advance in order to remind users to upgrade.&lt;/blockquote&gt;

= Next Steps =

Learning more about {{project_name_long}} is the best way to determine whether it is a suitable solution in your personal circumstances. The following chapters are recommended:

* The [[Warning]] page to understand the security limitations of {{project_name_long}} and Tor.
* Further information about {{project_name_long}} [[Features]].
* The implied [[Trust]] placed in {{project_name_long}} when it is used.
* Other relevant [[Documentation|Documentation]] explaining how to use {{project_name_long}} safely.

= See Also =

* [[Whonix against Real Attacks|Whonix Track Record against Real Cyber Attacks]]
* [[History|10 years history of success]]

= Footnotes =

{{reflist|close=1}}

[[About|About]]

[[Category:Documentation]]

= License =

{{License_Amnesia|{{FULLPAGENAME}}}}

{{JonDos}} The "Summary" chapter of the {{project_name_long}} Design and Goals wiki page contains content from the JonDonym documentation [https://anonymous-proxy-servers.net/en/help/about.html Features] page.

{{Footer}}

[[Category:Documentation]]</text>
      <sha1>qsvtbfytg97o7uyh1gmh6dlw2wqzvyp</sha1>
    </revision>
    <revision>
      <id>92352</id>
      <parentid>92097</parentid>
      <timestamp>2023-01-25T14:47:54Z</timestamp>
      <contributor>
        <username>Hans</username>
        <id>5031</id>
      </contributor>
      <origin>92352</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="26251" sha1="eo861h1k0mucxucclkrqkch1mss6a8j" xml:space="preserve">&lt;!--
Copyright:

   {{project_name_long}} About wiki page Copyright (C) Amnesia &lt;amnesia at boum dot org&gt;
   {{project_name_long}} About wiki page Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP &lt;adrelanos@whonix.org&gt;

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to:

    Free Software Foundation, Inc.
    51 Franklin St, Fifth Floor
    Boston, MA 02110-1301, USA.

On Debian GNU/Linux systems, the complete text of the GNU General Public
License can be found in the /usr/share/common-licenses' directory.

The complete text of the GNU General Public License can also be found online on gnu.org &lt;https://www.gnu.org/licenses/gpl.html&gt;, in {{project_name_long}} virtual machine images in /usr/share/common-licenses/GPL-3 file or on Github &lt;https://github.com/{{project_name_short}}/derivative-maker/blob/master/GPLv3&gt;.
--&gt; &lt;!--
This wiki page is a fork of the Tails About page, from this exact source &lt;https://git.immerda.ch/?p=amnesia.git;a=blob;f=wiki/src/about.mdwn;hb=9ff23c529b206f6f3d637257f8f1f2aa434f3d27&gt;.
--&gt;
{{Header}} {{hide_all_banners}} {{Title|title=
{{project_name_long}} - Overview
}} {{#seo:
|description=Privacy protection. Anonymity online. Anonymous Operating System. {{project_name_long}} routes all Internet traffic through the Tor anonymity network. Security by Isolation. Based on Debian. {{project_name_long}} Architecture.
|image=Whonixonly.jpg
}} {{#css:
.intro-p {
  margin-top: 0 !important;
}
#mw-content-text .wikitable {
  border-spacing: 8px;
  margin-left: -8px!important;
}
#mw-content-text .wikitable th {
  background: #cdf5c7;
  vertical-align: middle;
}
#mw-content-text .wikitable th[scope=row] {
  background: #d2effd;
}
#mw-content-text .wikitable td {
  background: #e6e6e6;
}
}} {{Anchor|overview}} {{intro|
'''{{project_name_long}} is an anonymous operating system that runs like an app''' and routes all Internet traffic through the Tor anonymity network. It offers privacy protection and anonymity online and is available for all major operating systems.
}}

{{LeftRightImageText
|image=Whonix-homepage-main.png
|addToClass=promo-style
|imagelink=Download
|text=
&lt;h3&gt;Superior Internet Privacy&lt;/h3&gt;
{{documentation_mininav}}
&lt;p&gt;
{{project_name_long}} is a free and open-source desktop {{os}} that is specifically designed for [https://www.whonix.org/#security advanced security and privacy]. It's based on the [https://torproject.org Tor] anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation. {{project_name_long}} [[Whonix_against_Real_Attacks|defeats common attacks]] while maintaining usability. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Kicksecure-promo.jpg
|addToClass=promo-style
|imageright=1
|imagelink=https://www.kicksecure.com
|text=
&lt;h3&gt;Security hardened&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened) which is run inside multiple &lt;u&gt;v&lt;/u&gt;irtual &lt;u&gt;m&lt;/u&gt;achines (VMs) on top of the host OS. This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. [[#Introduction|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image=Preview-user-groups.jpg
|addToClass=promo-style
|imageright=1
|imagelink=Users_of_Whonix
|text=
&lt;h3&gt;Privacy First Users&lt;/h3&gt;
&lt;p&gt;
The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. [[#Whonix_.E2.84.A2_User_Groups|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

{{LeftRightImageText
|image={{project_name_short}}-concept-detailed.jpg
|addToClass=promo-style
|text=
&lt;h3&gt;Innovative Architecture&lt;/h3&gt;
&lt;p&gt;
{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]. 
The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. This innovative architecture allows for maximum privacy, keeps applications in check and makes DNS leaks impossible. [[#Whonix_.E2.84.A2_Architecture|Learn more]].
&lt;/p&gt;
}}

&lt;div class="vspacer-20 margin-top-20"&gt;&lt;/div&gt;

&lt;center&gt;
{{#widget:Download_Button
 |text=Download Whonix ™ (FREE)
 |url=/wiki/Download
 |fontsize=22px
}}
&lt;div class="vspacer-20"&gt;&lt;/div&gt;
{{Supported_Platforms_Icons|
size=50
}}
&lt;/center&gt;

&lt;div class="vspacer-20 margin-top-30"&gt;&lt;/div&gt;

----

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

'''Now we're diving deep into what makes {{project_name_long}} great.''' We'll provide a more detailled look and lots of links for you to even more thoroughly study {{project_name_long}}.

&lt;div class="vspacer-20"&gt;&lt;/div&gt;

__TOC__

= Introduction =

[[File:Whonix-logo-rectangle.png|thumb|130px|[[Dev/Logo|{{project name long}} rectangular logo]]]]
[[File:Kicksecure-seal.png|thumb|130px]]
[[File:Debian.png|thumb|130px|Debian logo]]
[[File:Tor-logo.png|thumb|130px|Tor logo]]
'''{{project_name_long}} is a free and open-source desktop {{os}}''' that is specifically designed for [https://www.whonix.org/#security advanced security and privacy]. It's based on the [https://torproject.org Tor] anonymity network, security-focused Linux Distribution {{Kicksecure_link
|
|{{Kicksecure}}
}}, GNU/Linux and the principle of security by isolation.

'''{{project_name_long}} [[Whonix_against_Real_Attacks|defeats common attacks]] while maintaining usability'''. Online anonymity and censorship circumvention is attainable via fail-safe, automatic and desktop-wide use of the Tor network. This helps to protect from traffic analysis by bouncing communications around a distributed network of relays run by global volunteers. Without advanced, end-to-end, netflow correlation attacks, an adversary watching an Internet connection cannot easily determine the sites visited, and those sites cannot discover the [[Users_of_Whonix|user]]'s physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). [https://blog.torproject.org/one-cell-enough-break-tors-anonymity/ If you can see both flows], simple statistics based on data volume and timing can determine whether they match up.
&lt;/ref&gt;

'''{{project_name_long}} uses an extensively security reconfigured Debian base ({{Kicksecure}} Hardened)'''. It consists of two virtual machines -- [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] -- which are designed to be used on a [[Download|supported]] host OS ([[Host_Operating_System_Selection|Host Operating System Selection]]). The host OS supporting {{project_name_long}} is usually the one installed on the user's computer, but OSes installed on external drives will also work ([[USB Installation]]). Users choose the preferred {{project_name_long}} configuration and may use either a Type I hypervisor ([[{{q_project_name_short}}|{{q_project_name}}]]), or a Type II hypervisor like [[KVM|KVM]] and [[VirtualBox|Virtualbox]].

'''This architecture provides a substantial layer of protection from malware and [[Data_Collection_Techniques#IP_Address|IP]] leaks'''. Applications are pre-installed and configured with safe defaults to make them ready for use with minimal user input. The user may install custom applications or personalize their desktop without fear of information leaks that could lead to de-anonymization. {{project_name_long}} is the only actively developed OS designed to be run inside a VM and paired with Tor. Though technically a "desktop" operating system, the security and anonymity tools {{project_name_long}} provides also make it ideally suited for hosting secure and anonymous onion services.

'''By helping [[Users_of_Whonix|users]] run applications anonymously {{project_name_long}} aims to preserve privacy and anonymity'''. A [[Tor Browser|web browser]], [[HexChat|IRC client]], [[Software#Office_Suite|office suite]], and [[Software|more]] come pre-configured with security in mind. Internet traffic by {{project name long}} is all routed through the Tor anonymity network.

{{project_name_long}} is [[Reasons for Freedom Software|Freedom Software]] and is based on {{Kicksecure_link
|
|{{Kicksecure}}
}} (security-focused Linux Distribution), Tor &lt;ref&gt;
https://www.torproject.org/about/overview.html.en
&lt;/ref&gt;, Debian GNU/Linux &lt;ref&gt;
https://en.wikipedia.org/wiki/Debian
&lt;/ref&gt;, and the principle of security by isolation.

= {{project_name_long}} User Groups =

[[File:Preview-user-groups.jpg|thumb|400px|link=Users_of_Whonix|[[Users_of_Whonix|Users of {{project name long}}]]]]

'''Privacy is a human right'''. The increasing threat of mass surveillance and repression all over the world means our freedoms and privacy are rapidly being eroded. {{project_name_long}} is a powerful solution to this problem. Anyone who values privacy, has business secrets, needs private communication or does sensitive work on their desktop or online can greatly benefit from using {{project_name_long}}. This includes the following. Also see [[Users_of_Whonix|Users of {{project name long}}]].

# '''Investigators and whistleblowers whose work threatens the powerful'''. Within our isolated environment, research and evidence can be gathered without accidental exposure.
# '''Researchers, government officials or business-people who may be targets of espionage'''. Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
# '''Journalists who endanger themselves and their families by reporting on organized crime'''. Compartmentalized, anonymous Internet use prevents identity correlation between social media and other logins.
# '''Political activists under targeted surveillance and attack'''. The usefulness of threatening the ISP in order to analyze a target's Internet use is severely limited. The cost of targeting a {{project_name_long}} user is greatly increased.
# '''Average computer users in a repressive or censored environment'''. Easy Tor setup and options for advanced configurations means users in repressive countries can fully access the Internet desktop-wide, not just in their browser.
# '''Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved and analyzed'''. {{project_name_long}} does not silently upload identifying information in the background.

= {{project_name_long}} Architecture =

{{Anchor|architecture}}

[[File:{{project_name_short}}-concept-detailed.jpg|thumb|400px|{{project name long}} Architecture]]
'''{{project_name_long}} consists of two VMs: the [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] and the [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]]'''. &lt;ref&gt;
In [[{{q_project_name_short}}|{{q_project_name}}]], these VMs are named &lt;code&gt;{{project_name_gateway_vm}}&lt;/code&gt; and &lt;code&gt;{{project_name_workstation_vm}}&lt;/code&gt;, respectively.
&lt;/ref&gt; The former runs Tor processes and acts as a gateway, while the latter runs user applications on a completely isolated network. The {{project_name_long}} architecture affords several benefits:

* Only connections through Tor are permitted.
* Servers can be run, and applications used, anonymously over the Internet.
* DNS leaks are impossible.
* Malware with root privileges cannot discover the user's real IP address.
* Threats posed by misbehaving applications and user error are minimized.
* The platform has [https://www.whonix.org/#security extensive security hardening].

= Features =

== Full Spectrum Anti-Tracking Protection ==

'''Hiding your identity is harder than just hiding your IP'''. Internet tracking companies don't even need to know your IP address to be able to identify you. They have multiple alternative tracking technologies in their arsenal. Whonix provides full spectrum anti-tracking protection.

'''Table:''' ''Surveillance Technology, Impact and {{project_name_long}} Defenses''

&lt;div class="scroll-table"&gt;
{| class="wikitable"
|-

! scope="col"| '''Surveillance Technology'''
! scope="col"| '''Impact on your Privacy'''
! scope="col"| '''{{project_name_long}} Tracking Protection Technology'''
|-

! scope="row"| [[Data_Collection_Techniques#IP|IP address tracking]]
| IP is tied to user identity and physical location.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Data_Collection_Techniques#Browser_Fingerprinting|Browser fingerprinting]]
| Tracking, creating a profile of the user even if the user is already cloaking its IP.
| [[Tor Browser]]
|-

! scope="row"| [[Fingerprint#Website_Traffic_Fingerprinting|Website Traffic Fingerprinting]]
| Your {{isp}} knows which websites and when you visited but does not know the exact details. And that even if the website is using https and you are using VPN. &lt;ref&gt;
[[Whonix_versus_VPNs#VPNs_do_not_even_hide_visited_websites_from_your_Internet_Service_Provider|VPNs do not even hide visited websites from your Internet Service Provider]]
&lt;/ref&gt;

For example, if you are posting to a discussion forum, your ISP or a man-in-the-middle could know the time and that you used that discussion forum but not the exact contents of your post. However, due to the specific timing specifically over time an attack could figure out who you are.
| [[Why_does_Whonix_use_Tor|IP cloaking using Tor]]
|-

! scope="row"| [[Keystroke_Deanonymization|Personal keyboard typing fingerprinting]]
| Re-identification once you are typing on a website because of your personal typing style.
| [[Keystroke_Deanonymization#Kloak|kloak (keystroke anonymizer)]]
|-

! scope="row"| [[Time_Attacks|Time attacks]]
| Individual computer time can give away your identity.
| [[Boot Clock Randomization]] and secure network time synchronization through [[sdwdate]] (Secure Distributed Web Date)
|-

|}
&lt;/div&gt;

== Based on Debian ==

[[File:Debian.png|thumb|130px|Debian logo]]
{{Based_on_Debian}}

{{Anchor|{{project_name_long}} Version}}

== Security by Isolation ==

'''{{project_name_long}} is the best way to use Tor and provides the strongest protection for your privacy online by hiding your real IP address, because {{project_name_long}} protects from leaks'''. In laymen's terms a leak occurs if a user expects to be wholly using Tor, but instead some application traffic bypasses Tor and is routed over the normal internet (clearnet). A solitary leak is all that is required to de-anonymize the user, for example via IP leaks, DNS leaks, UDP and other channels.

'''Even when Tor provides sufficient anonymity, it can be [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO very complicated or impossible] for users to configure applications''' so all traffic is routed through the Tor network. The reason is networking is very complex and most applications are not designed with anonymity or privacy in mind. Some applications like the Tor Browser Bundle are specifically designed for anonymity and attempt to eliminate all known leak vectors.  Unfortunately, despite all best efforts leaks have occurred in the past due to [[Whonix_against_Real_Attacks#Tor_Browser_Bundle|Tor Browser Bundle software defects (bugs)]]. In such cases, {{project name long}} users were protected and unaffected by these leaks.

'''In {{project_name_long}}, DNS and other related leaks (IP, DNS, UDP, ICMP) are impossible'''. Even malware with root privileges cannot discover the user's real IP address because {{project_name_long}}'s split-VM design ensures all internet traffic is routed through Tor.

''{{project_name_long}} is divided into two VMs'':

* [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] to enforce routing of all Internet traffic through the Tor network, and
* [[{{project_name_workstation_short}}|{{project_name_workstation_long}}]] for work activities. {{project_name_workstation_long}} is unaware of its real external IP address, which means the user's real external IP address is always protected and leaks are impossible.

'''This security by isolation configuration averts many threats posed by [[malware]], misbehaving applications, and user error.'''

'''Figure:''' ''{{project_name_long}} Operating System Design''

[[File:{{project_name_short}}-concept-detailed.jpg|500px]]

([[Art_Gallery#Technical_Illustrations|more technical illustrative images]])

'''This is not an empty claim -- {{project_name_long}} has been audited via the [[corridor]] (Tor traffic whitelisting gateway) and other [[Dev/Leak Tests|leak tests]]'''. In over a [[History|decade]], no leaks were ever discovered. Technical readers can refer to the [[Dev/Technical_Introduction|{{project name long}} technical introduction]] and [[Dev/Technical_Introduction#Security_Overview|security overview]] chapters for further details.

== Online Anonymity via Tor ==

[[File:Tor-logo.png|thumb|130px|Tor logo]]
{{project_name_long}} relies on the Tor network to protect a user's anonymity online; all connections are forced through Tor or otherwise blocked. Tor helps to protect users by bouncing communications around a distributed network of relays run by volunteers all around the world. Without advanced, end-to-end, netflow correlation attacks, anybody watching a user's Internet connection cannot easily determine the sites visited, and those sites cannot learn the user's physical location. &lt;ref&gt;
Current practical, low-latency, anonymity designs like Tor fail when the attacker can see both ends of the communication channel (traffic going into and out of the Tor network). {{Archive_link
|url=https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
|text=If both flows are visible
|onion=http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/one-cell-enough-break-tors-anonymity/index.html
}} simple statistics can determine whether they match up.
&lt;/ref&gt;

To learn more about Tor, read the official documentation on the {{Archive_link
|url=https://www.torproject.org/
|text=Tor website
|onion=http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
}}:

* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#whyweneedtor
|text=Tor overview: Why we need Tor
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#whyweneedtor
}}
* {{Archive_link
|url=https://2019.www.torproject.org/about/overview.html.en#thesolution
|text=Tor overview: How Tor Works
|onion=http://jqyzxhjk6psc6ul5jnfwloamhtyh7si74b4743k2qgpskwwxrzhsxmad.onion/about/overview.html.en#thesolution
}}
* {{Archive_