Whonix
Systèmes d'Exploitation SécurisésGratuitEn vedette
// DESCRIPTION
Desktop OS for advanced anonymity. Two-VM architecture.
// TAGS
torvmisolationanonymity
0 views
1/26/2026
Desktop OS for advanced anonymity. Two-VM architecture.
Amnesic operating system. All traffic through Tor, leaves no traces.
Security by compartmentalization OS. Isolation through Xen.
The most popular pentesting distribution. Pre-installed tools.
Security distribution focused on privacy and development.