July 18, 2019 update
Whonix is a network device designed to keep your name confidential, confidential and secure
Security. Tor takes anonymity and security
To protect. DNS source is not possible, root program is not completely unknown
Access can identify the actual IP user. This is a safe way for him
Go deeper into the internet than you do with Tor
system. Using a Windows network is tedious
Operating machine is available directly from NSA
Mike is the information requested by Microsoft
(Read more about NSA and Microsoft [
whonix [helps to understand how Whonix is handled
this is true
I can do it. Whonix has two parts. Only one person manages the network
This is called the Whonix gateway and acts as a gateway. Second stage
This is called the Whonix workspace and is used by users. Sell one
The only Internet connection that allows only Internet connections.
They both drive real cars
A computer that stores Whonix content.
First you want to record a virtual box
Virtual Machines Run Venus on your computer. Then start the Venus gateway and workstation.
[Has download options, and you can choose what you want to think
If you know how to do this, you can also click the signature button. However it may be
Want to know how to use the PGP Encryption Guide?
After installing the virtual box, open the program and follow these steps.
1. Click File> Import Device
2. Click Select and select the downloaded Winx Gateway.vova file.
3. Click Next and then Import without changing the settings.
U. Wait for the progress bar to complete the import.
5. Repeat the following steps for the Wonix-workstation.ova file.
6. Now run Vanx Gate and Vanx Center.
You must complete the installation process immediately before use.
Then wait for Venix to see and install everything you need.
Update. However, note that you still need to run Venix Gate
Use only for updates. you
Complete all your tasks on the Venus virtual site
Now that you can use Whonix as a safe device for everyone, make sure there are no major changes in your computer.