Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Cyber Offensive Fundamentals 320x200 V0.1
UtiliaCS 970x120
Whonix 17.4 is out! Only a 0day exploit can threaten your anonymity.

Whonix 17.4 is out! Only a 0day exploit can threaten your anonymity.

14 August 2025 12:49

Version 17.4 of the Whonix distribution, designed to ensure greater anonymity online, has been released. The system is based on Debian GNU/Linux and transmits all traffic via Tor. The source code is public and released under the GPLv3 license.

The new virtual machine images in OVA format for VirtualBox are available for download : with Xfce (2.3 GB) and console (1.5 GB).

Whonix is based on a two-component scheme. Whonix-Gateway acts as a network gateway, allowing connections only through Tor, while Whonix-Workstation acts as an isolated work environment.

Both systems are included in the same image, but run on different virtual machines. This means that the workstation does not have direct access to the network, and its network settings are always fictitious. Even if the browser is hacked or the attacker gains root access, the real IP address remains hidden.

If Whonix Workstation is compromised, the attacker will only see fake addresses, as real data and DNS requests pass through the gateway. The developers warn that because Whonix is designed to run within a hypervisor, there is a risk of zero-day exploits on virtualization platforms that can provide access to the host system. Therefore, it is not recommended to keep Gateway and Workstation on the same computer.

By default, Whonix-Workstation uses Xfce and includes preinstalled applications: VLC, Tor Browser, Pidgin, and others.

Whonix-Gateway comes with server software, including Apache httpd, nginx, and IRC servers, and also supports connection forwarding via Tor for Freenet, i2p, JonDonym, SSH, and VPN. If desired, you can use the gateway alone, connecting existing workstations, including Windows ones, to it for anonymous Internet access.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Cropped RHC 3d Transp2 1766828557 300x300
The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.