Introduction to the WhonixOS

15.08.18 в 14:38 Reviews and cases 16723

Whonix is a system for hackers and fans of anonymous visits to web resources. With proper configuration, this specialized Linux distribution allows you to walk around the network without disclosing any identity using the Tor network (The Onion Router).

The system runs from a virtual machine, if desired, it can be installed on a physical workstation.

Internal organization

Whonix is divided into two systems (images are based on Debian):

  • Whonix-Gateway;
  • Whonix-Workstation.

Anonymity is guaranteed to the user by the fact that the Gateway virtual machine is completely isolated from direct contact with the Internet. All traffic is first passed through another machine (Workstation), and that in turn enters the network via Tor. As a result, the workstation can not know its external IP. In addition, the separation of the environment allows you to protect your work from harmful effects (viruses of all types).

Differences from the alternative TailsOS

Similar to Whonix is the Tails system, based on the Debian distribution. It works in Live mode from a DVD or USB drive. Whonix, thanks to the physical separation of system components, the protection is higher.

The advantages of Tails are:

  • mobility (you can start without installing a virtual or physical machine);
  • speed (an image with a capacity of 910 MB is loaded very quickly);
  • Windows Stealth Mode (allows you to represent the working environment, disguised as Windows 8).

Like Whonix, Tails works only through the Tor network. Also, the system has a Claws Mail client and an on-screen keyboard as part of the delivery.

Whonix benefits:

  • resistant to DNS-leaks (requests are redirected to the Tor-DNS ports);
  • надёжный хостинг onion-сервисов (даже взломав веб-сервис, злоумышленник не сможет похитить закрытый ключ сайта);
  • support for obfuscated bridges;
  • Support for Protocol-Leak-ProtectionandFingerprinting-Protection, which protects by default the creation of images-user clones;
  • The ease of using VPN + Tor in any combination.

The main disadvantage of the system is the fact that Tor and Whonix have different development companies. If you detect threats and security holes in Tor, this will directly affect Whonix users.

Deployment instructions

First of all, you need to download the images of Whonix-Gateway and Whonix-Workstation and VirtualBox. And only with official websites. Then VirtualBox is deployed on the computer. And already with it alternately run two images of Whonix. The RAM settings can not be changed, the default values for comfortable operation are quite enough.

After running the images of Whonix at the user's disposal - two virtual machines: Gateway and Workstation. The first one to run is Gateway. Once loaded, it displays a window in which you want to press the Understood key. Next, you need to configure bridges, proxies and firewalls (choose the first option by default and run updates in each case). After the installation is complete, the Arm-Torcontroller is started and the Tor work is checked. If the traffic passes, you can run the Workstation by filling in all the windows.

From the console enter sudosu, enter the password changeme, specify passwd and come up with a new password. Next, update the system with the sudoapt-getupdate && sudoapt-getdist-upgrade command.

To add Russian, enter: sudodpkg-reconfigurelocales.

To set the Russian language, select ru_RU.UTF-8 UTF-8.

Whonix is ready to go! For greater security, you can add a VPN, for example, implement a VPN-Tor-VPN scheme by installing a VPN on the host machine and uploading an .ovpn file to the Workstation (openvpn is installed by default).

Working with Whonix

Once the gateway is started, all other operations are performed on the side of the Whonix-Workstation workstation, which runs on a virtual machine in VirtualBox, similar to the gateway. By default, to start the system, the RAM values and the number of cores are sufficient, but it is better to increase their number for comfortable work. In addition, you will have to set the password for the user user and the password changeme. The Tor browser will be automatically downloaded and installed after running the appropriate shortcut on the desktop of the system.

In addition to the workstation's virtual machine, the Whonix-Gateway can provide access to Internet resources to any computer or third-party virtual machine. For this purpose, the gateway has two network adapters. One of the adapters is used to communicate with the Internet, and the other is used for secure interaction with the connected workstations. Over this network interface, many virtual or physical machines can connect to the Internet with the help of the Whonix-Gateway gateway without any problems.



伴随着会联网的广泛使用,随之带来一系列的危险。首先涉及到匿名和安全性。如果信息不设防范手段,您的数据很可能被入侵 — 这里举个例子,关于在公用网络中的私人的信件。

最初的互联网预想让空间没有国界化,无论在在那里都可以绝对匿名地获取任何信息。现在很多国家都出现了禁止访问某些资源的情况 。

12月 2017


In the recent past by the standards of the development of information technologies, in 2015 Google created artificial intelligence based on neural networks, which was able to analyze the condition around itself and draw conclusions about its further education. The name of the new offspring from Google was given in abbreviated from the term "deep Q-network" - DQN. The DQN started training in common arcade games (Pakman, Tennis, Space Invaiders, Boksing and other classics).

​The most common methods for organizing network anonymity are the Tor browser and the VPN technology. With their help, a real IP address is hidden, Internet censorship is circumvented and international restrictions are overcome.


Receiving big volumes of data from websites for its following analysis plays a key role for plenty of projects. Target resource structure analysis and scraping of the relevant information are often connected to blocks or access restriction issues from website administration.

If you’re looking for a package of residential or mobile proxies with the ability to work with a particular country or ISP, the best option is definitely Exclusive Mix. With it you will be able to download the list which consists of proxies from preliminarily chosen countries and carriers, flexibly filtering it for your needs.

7月 2021

How to web scrape with python? It's a question that many beginners have. At the entry level, the process is quite simple, and anyone can quickly get their project off the ground. However, to successfully work on such a task, you should not forget about many aspects, which are not easy to understand at once.


Proxy server: what is it? Main advantages of working via a virtual “mediator” – anonymity on the web, avoiding all bans, protection against attacks, intellectual property protection



Trustpilot 4.5