Chapter 4. Using Whonix Securely and Anonymously
If you made it this far, you're now ready to begin using Whonix. This tutorial is not intended
to be a full manual for everything involving Whonix or security and anonymity. However, you will
be given the basics on installing and using a number of very good tools. Additionally, unless
otherwise specified, all instructions are intended to be executed in the Whonix Workstation. To
learn more about Whonix and its various uses, it is strongly recommended that you visit and
read the following links:
[Whonix Security Guide]
[Warnings Guide & Behavior to Avoid]
If you need any support or troubleshooting for using Whonix, please go to
As the first rule (or advice) going forward from this point, do not use Whonix to login to
any accounts that you have used without Whonix and can be traced to your identity. Consider
everything you do from here forward the creation of a new identity.
Additionally, when using this set up in the future, always boot the Whonix Gateway virtual
machine first in VirtualBox. If you boot the Whonix Workstation first, it won't work.
Finally, do not use the main Debian host operating system that you installed on your
computer for surfing the web or engaging in other net related activities! The goal is to keep
Debian as clean as possible. Surfing the web with the Debian host operating system opens up
greater possibilities that your machine may be infected with malware. If your Debian host operating
system becomes infected with malware, then your Whonix virtual machines are compromised as
well. Therefore, use Whonix Workstation for all your networking activities.