Whonix Variants

From Whonix
Jump to navigation Jump to search

Comparison of Whonix in a VM vs Whonix with Physical Isolation with and without virtualized Gateway.

Comparison of Different Whonix Variants[edit]

The security and usability of the Whonix platform is significantly affected by the hardware and virtualization configuration, and whether a Whonix-Custom-Workstation is created. Qubes-Whonix is currently recommended as providing the best combination of security and usability, although it has strict hardware requirements The Web Archive Onion Version .

Virtualization and Hardware Configurations[edit]

Table: Whonix Platform Comparison

Variant Systems Number of systems Security Usability
Standard Binary Download host + VM + VM 2 Basic Easy to redistribute and install
Physical Isolation with Bare-metal Gateway host + VM + host 3 Equivalent to the standard binary download Difficult to install and for advanced users only
Physical Isolation with Virtualized Gateway host + VM + host + VM 4 Higher attack surface Easier to deploy. Four operating systems must be kept updated
Physical Isolation without any Virtualization host + host 4 Nearly the same as standard Physical Isolation [1] Without virtual machines, there is no protection against hardware fingerprinting Difficult to install and for advanced users only
Qubes dom0 + VM + VM 3 Better compartmentalization. See: Why use Qubes over other Virtualizers? Best
OneVMarchive.org (ignore page title) host + VM 2 Deprecated -
UniStation host 1 Proof of concept only -

Virtual machines can provide the following security-related features:

  • Network isolation: Connections can easily be forced through Tor.
  • Hardware isolation: Unique hardware serials can be hidden.
  • Roll back feature: Users can revert to clean and/or working snapshots.
  • Multi-level security: Multiple clones / VMs / Disposables provide significant protection.

In comparison, live CDs provide:

  • Non-persistence: This increases safety in the event of a software compromise. [2]
  • Anti-forensics capability and plausible deniability: If the computer is powered down and RAM has faded or been wiped, remnants of critical information like encryption keys should be impossible to retrieve.
  • Update issues: It is difficult to roll out security updates and maintain a fully up-to-date system.

Operating System Configurations[edit]

Whonix provides multiple operating system options:

  • Debian bookworm GNU/Linux: The Default-Download-Version is recommended for most users.
  • Other Operating Systems: Windows, FreeBSD, other GNU/Linux, and Android Whonix-Custom-Workstation are possible.

Info Users should refer to Security Comparison: Whonix-Download-Workstation vs. Whonix-Custom-Workstation before choosing this option. A number of anonymity protections must be manually configured in Whonix-Custom-Workstation.

Security Comparison: Whonix-Download-Workstation vs. Whonix-Custom-Workstation[edit]

See Security Comparison: Whonix-Download-Workstation vs. Whonix-Custom-Workstation. Unless otherwise stated, the documentation and design refers to the Default-Download-Version.

Old Instructions[edit]

Footnotes[edit]

  1. For further discussion of this issue, see: More or Less Protection inside a VM?archive.org
  2. Unless sophisticated and targeted malware manages to leverage the exploit, leading to a compromise of firmware or other persistent systems (like BIOS).

We believe security software like Whonix needs to remain open source and independent. Would you help sustain and grow the project? Learn more about our 12 year success story and maybe DONATE!