Whonix is an operating system focused on anonymity and security. It hides the user’s IP address/location and uses the Tor network to anonymize data traffic. This means the contacted server, network eavesdroppers, and operators of the Tor network cannot easily determine which sites are visited, or the user’s physical location. It realistically addresses attacks while maintaining usability. It makes online anonymity possible via fail-safe, automatic, and desktop-wide use of the Tor network. A massively reconfigured Debian base is run inside multiple virtual machines, providing a substantial layer of protection from malware and IP leaks. Pre-installed, pre-configured applications are ready for use, and installing additional apps or personalizing the desktop will in no way jeopardize the user. Whonix is the only actively developed OS designed to be run inside a VM and paired with Tor. Whonix consists of two virtual machines: one of the virtual machines running Tor, acting as a gateway, so-called Whonix-Gateway; another virtual machine called Whonix-Workstation, work in a completely isolated network, connect all through Tor Transit.
Anonymous Communications, Hosting and Publishing
- Anonymous IRC.
- Anonymous publishing.
- Anonymous E-Mail with Mozilla Thunderbird, Enigmail and TorBirdy.
- Anonymous chat.
- Anonymous VoIP.
- Anonymous file sharing with OnionShare. 
- Host location / IP hidden servers.
- Mixmaster over Tor.
- Ricochet IM and other encrypted communications. 
- Send anonymous emails without registration.
- Based on Debian GNU/Linux.
- Based on the Tor anonymity network.
- Based on KVM.
- Based on VirtualBox.
- Based on Qubes.
- Free, open source, Libre software.
- Virtual machine images with Type I or 2 hypervisors.
Tor Network / Toriffication
- Can torify almost any application.
- Can torify other operating systems.
- Can torify Windows.
- Circumvents censorship.
- DNSSEC over Tor. 
- Encrypted DNS. 
- Tor enforcement.
Security and Anonymity Protection
- Full IP/DNS protocol leak protection.
- Hide Tor and Whonix use from network observers. 
- Disposable Whonix-Workstations in Qubes-Whonix.
- Whonix live mode in non-Qubes-Whonix. 
- Hide installed software from network observers.
- Optional Isolating proxy.
- Prevents anyone from learning the user’s IP address.
- Prevents anyone from learning the user’s physical location.
- Private obfuscated bridges support.
- Simplification of Tor and (meek-lite) bridge connections via Anon Connection Wizard. 
- Protects user privacy.
- Protocol-Leak-Protection and Fingerprinting-Protection.
- Secure and distributed time synchronization mechanism.
- Security by isolation.
- Stream Isolation to prevent identity correlation through circuit sharing.
- Transparent Proxy.
- Whitelist Tor traffic with corridor.
Tunnel and Chaining Support
- Connect to a Proxy, VPN or SSH before Tor.
- Connect to Tor before a Proxy, VPN or SSH.
- Tunnel UDP over Tor. 
- VPN / tunnel support.
Tunnel Other Anonymizing Networks
Whonix 14 has been released.
- Rebased Whonix on Debian stretch (Debian 9).
- 64-bit (amd64) only – 32-bit (i386) images will no longer be built and made available for download. 
- The new Anon Connection Wizard  feature in Whonix simplifies connections to the Tor network via a Tor bridge and/or a proxy.
- The Tor pluggable transport meek_lite  is now supported, making it much easier to connect to the Tor network in heavily censored areas, like China. 
- Onioncircuits are installed by default in Whonix. 
- Tails’ onion-grater program has been implemented to enable OnionShare, Ricochet and Zeronet compatibility with Whonix. 
- Onion sources are now preferred for Whonix updates/upgrades for greater security.
- Reduced the size of the default, binary Whonix images by approximately 35 per cent using zerofree.  
- Updated Tor to version 3.3.7 (stable) release to enable full v3 onion functionality for both hosting of onion services and access to v3 onion addresses in Tor Browser.
- Created the grub-live package  which can run Whonix as a live system on non-Qubes-Whonix platforms. 
- Corrected and hardened various AppArmor profiles to ensure the correct functioning of Tor Browser, obfsproxy and other applications.