In this chapter, we talked about Whonix, how to install it, and its basic use. We discussed what makes Whonix unique, and how it helps protect the user's privacy and security. We saw how easy it is to access the Dark Web using Whonix since it was developed for that purpose. There's no need to install or configure anything after installing the OS.
As we've discussed, Whonix works with two VMs, one acting as the gateway and securing the traffic, and the other as the workstation, providing a desktop interface for the user. Always remember to start Whonix-Gateway first, to verify that the traffic is going through it, and then turn on the Whonix-Workstation.