VFAQ
From Whonix
Why is the Default Username "user" and Password "changeme"?[edit]
Because 'technically' there is "no installation". Whonix ™ images are pre-installed operating system images. The history of Whonix ™ is that we started to ship downloadable VM images. What you might perceive as installation process, for example VirtualBox import is "not an installation". It is the same for any VM image that would be imported. There is no feature in virtualizers that would allow to inject code to do things at this stage. The code running for importing the images is solely by the virtualizer and modifying that would be non-trivial and require to maintain a fork of the virtualizer. To add such code on the operating system that hosts Whonix ™ would be non-trivial and operating system specific. It would require to mount and modify the images. Too unimportant to put any effort into it. Would probably result in more bugs, and confusion, than what we have now. I see Qubes(-Whonix ™) as the evolution of this, since there are no passwords there.
For further information, refer to this forum discussion: Whonix ™ Installation from default password to user password [archive].
Where are the 32-bit Whonix ™ Builds?[edit]
Only 64-bit Whonix ™ builds are available for download. [1] This decision is based on the small number of affected users and the associated maintenance burden. To learn more, see: 32-bit or 64-bit?
Forum discussion: virtualbox has no installation candidate [archive].
Why is KVM Recommended over VirtualBox?[edit]
In summary:
- VirtualBox does not meet the definition of Free Software;
- the parent company Oracle has poor security practices -- serious bugs have remained unpatched for an extended period; and
- significant VirtualBox functionality is only available as a proprietary extension.
To learn more, see: Why Use KVM Over VirtualBox?
Why is Qubes Recommended over other Virtualizers?[edit]
In summary, Qubes:
- runs a bare-metal virtualizer (Xen) and isolates hardware controllers and multiple user domains (qubes) in separate VMs that are explicitly assigned different levels of trust;
- has an advanced separation / least privilege design;
- provides better hardware and protocol protection than software compartmentalization;
- provides significant networking protection;
- allows advanced security features like Disposable VMs, secure copy / paste operations between VMs, secure copying and transfer of files between VMs, and sanitization of PDFs and images;
- can tunnel the whole system more easily through Tor;
- enables multiple Whonix-Workstation ™ AppVMs to easily use the same Whonix-Gateway ™ ProxyVM without being able to make contact with one another; and
- is easier to install and has better performance.
To learn more, see:
- Why use Qubes over other Virtualizers?
- Forum: Qubes-Whonix Security Disadvantages - Help Wanted! [archive]
Footnotes[edit]
- ↑ From Whonix ™ 14 onward.
Whonix ™ is Supported by Evolution Host DDoS Protected VPS. Stay private and get your VPS with Bitcoin or Monero.
100px | |
Fosshost | About Advertisements |
Search engines: YaCy | Qwant | ecosia | MetaGer | peekier | Whonix ™ Wiki
There are five different options for subscribing to Whonix ™ source code changes.
Priority Support | Investors | Professional Support
Whonix ™ | © ENCRYPTED SUPPORT LP | Freedom Software / Open Source (Why?)
The personal opinions of moderators or contributors to the Whonix ™ project do not represent the project as a whole.