Tor Tutorials

Whonix Setup Guide — Tor in a Virtual Machine

Whonix is a security-focused operating system that runs inside virtual machines. It consists of two VMs: a Gateway (routes all traffic through Tor) and a Workstation (where you work). Even if the Workstation is compromised, your real IP can never leak — the Gateway prevents it at the network level.

Need this done for your project?

We implement, you ship. Async, documented, done in days.

Start a Brief

How Whonix Works

Whonix uses two virtual machines:

  • Whonix Gateway — Runs Tor and acts as the network gateway. All traffic must pass through it.
  • Whonix Workstation — Your desktop environment. It can ONLY connect to the internet through the Gateway. Even malware that compromises the Workstation cannot bypass Tor.

This is more secure than running Tor Browser on your regular OS because the isolation is enforced at the network level, not just the application level.

Installation Steps

  1. Install VirtualBox (free) from virtualbox.org
  2. Download Whonix Gateway and Workstation images from whonix.org
  3. Import both .ova files into VirtualBox
  4. Start the Gateway first — it connects to Tor
  5. Start the Workstation — it routes through the Gateway automatically

Whonix also supports KVM/QEMU for Linux users who prefer native virtualization.

Whonix vs Tails

FeatureWhonixTails
Runs onVirtual machine (any OS)Boots from USB
PersistenceFull — save files and install softwareLimited — encrypted USB partition
IP leak protectionNetwork-level VM isolationAll traffic through Tor
Best forDaily anonymous computing, developmentMaximum amnesia, public computers

Develop .onion Services with Whonix

Whonix is excellent for developing and testing .onion services before deploying them. Build your site locally in the Whonix Workstation, test it via Tor, then deploy to AnubizHost for production hosting with managed Tor infrastructure.

Why Anubiz Labs

100% async — no calls, no meetings
Delivered in days, not weeks
Full documentation included
Production-grade from day one
Security-first approach
Post-delivery support included

Ready to get started?

Skip the research. Tell us what you need, and we'll scope it, implement it, and hand it back — fully documented and production-ready.

Support Chat

Online