qubes-doc/privacy/whonix-install.md
Axon 73a546854a
Clean up and organize privacy pages
* Logically organize the Whonix-related pages
* Move the VPN page to /configuration/
  * VPNs are used for more than just privacy, and many VPN setups and
    services either can't or don't claim to provide privacy.
* Remove `/privacy/` from URLs
  * These directory names are just for organizing the source pages,
    *unless* an actual page resides there. Since there is no
    /doc/privacy/ page, it's unnecessary and misleading to have this in
    the URLs. It also breaks uniformity, since none of the other pages
    have their informal group name in their URL (again, unless there's
    a page with that name).
2016-02-20 21:15:30 +00:00

2.8 KiB
Raw Blame History

layout title permalink redirect_from
doc Install Whonix in Qubes /doc/whonix/install/ /doc/privacy/install-whonix/

Install Whonix in Qubes

Installing Whonix in Qubes is simple and only requires a few simple steps.

First Time Users

Using privacy and anonymization tools like Whonix is not a magical solution that instantly makes you anonymous online. Please consider:

  • Do you know what metadata or a man-in-the-middle attack is?
  • Do you think nobody can eavesdrop on your communications because you are using Tor?
  • Do you know how Whonix works?

If you answered no, have a look at the about, warning and do not pages (on the Whonix website) to make sure Whonix is the right tool for you and you understand it's limitations.


Install Templates

Launch the dom0 terminal Konsole from your Qubes App Launcher. Then enter the following command to install the Whonix-Gateway and Workstation TemplateVMs.

sudo qubes-dom0-update --enablerepo=qubes-templates-community qubes-template-whonix-gw qubes-template-whonix-ws

Download will take a while and there will be no progress indicator.

After doing this, you should see two new TemplateVMs in the VM Manager called whonix-gw and whonix-ws

Enabling AppArmor

This is an optional security enhancement (for testers-only). If youre technical & interested, see Enabling AppArmor.

Configuring Whonix VMs

Create a Whonix-Gateway ProxyVM by clicking on Create a New VM and select whonix-gw as the template and select ProxyVM as the type.

Create Whonix-Gateway ProxyVMs

Create a Whonix-Workstation AppVM by clicking on Create a New VM and select whonix-ws as the template and select AppVM (should be default) as the type.

Create Workstation AppVMs

Configure the Whonix-Gateway TemplateVM to use the sys-whonix ProxyVM that you just created.

TemplateVM Proxy Settings

Great. You should be all done installing Whonix into Qubes. Use these two TemplateVMs and the ProxyVM you just added, like you would for any other VMs.

Running Applications

To start an application in the Whonix-Workstation AppVM that you created, launch it like any other- open the Qubes App Launcher and then select an app such as Privacy Browser which will then launch the Tor Browser

Advanced Information

You can learn more about installing Whonix, Qubes-Whonix or Whonix generally.