* Logically organize the Whonix-related pages * Move the VPN page to /configuration/ * VPNs are used for more than just privacy, and many VPN setups and services either can't or don't claim to provide privacy. * Remove `/privacy/` from URLs * These directory names are just for organizing the source pages, *unless* an actual page resides there. Since there is no /doc/privacy/ page, it's unnecessary and misleading to have this in the URLs. It also breaks uniformity, since none of the other pages have their informal group name in their URL (again, unless there's a page with that name).
2.8 KiB
layout | title | permalink | redirect_from |
---|---|---|---|
doc | Install Whonix in Qubes | /doc/whonix/install/ | /doc/privacy/install-whonix/ |
Install Whonix in Qubes
Installing Whonix in Qubes is simple and only requires a few simple steps.
First Time Users
Using privacy and anonymization tools like Whonix is not a magical solution that instantly makes you anonymous online. Please consider:
- Do you know what metadata or a man-in-the-middle attack is?
- Do you think nobody can eavesdrop on your communications because you are using Tor?
- Do you know how Whonix works?
If you answered no, have a look at the about, warning and do not pages (on the Whonix website) to make sure Whonix is the right tool for you and you understand it's limitations.
Install Templates
Launch the dom0
terminal Konsole
from your Qubes App Launcher. Then enter the following command to install the Whonix-Gateway and Workstation TemplateVMs.
sudo qubes-dom0-update --enablerepo=qubes-templates-community qubes-template-whonix-gw qubes-template-whonix-ws
Download will take a while and there will be no progress indicator.
After doing this, you should see two new TemplateVMs in the VM Manager called whonix-gw
and whonix-ws
Enabling AppArmor
This is an optional security enhancement (for testers-only). If you’re technical & interested, see Enabling AppArmor.
Configuring Whonix VMs
Create a Whonix-Gateway ProxyVM by clicking on Create a New VM
and select whonix-gw
as the template and select ProxyVM as the type.
Create a Whonix-Workstation AppVM by clicking on Create a New VM
and select whonix-ws
as the template and select AppVM (should be default) as the type.
Configure the Whonix-Gateway TemplateVM to use the sys-whonix
ProxyVM that you just created.
Great. You should be all done installing Whonix into Qubes. Use these two TemplateVMs and the ProxyVM you just added, like you would for any other VMs.
Running Applications
To start an application in the Whonix-Workstation AppVM that you created, launch it like any other- open the Qubes App Launcher
and then select an app such as Privacy Browser
which will then launch the Tor Browser
Advanced Information
You can learn more about installing Whonix, Qubes-Whonix or Whonix generally.