Security and Anonymity - TOR Part 3

There are three main Operating systems that every one of us knows - Windows, Linux, and macOS. While each of them has its own pros and cons, they aren’t what you’d call specialized OS. In this part, we will be taking a look at three different Operating systems, each specializing in Security and Anonymity, and how using TOR in those OS leads to the perfect anonymous experience ever!

Tails OS:

Tails, also known as The Amnesic Incognito Live System, is a security-focused Debian-based Linux distro, with the GNOME desktop environment aims specifically at anonymity and security. Tails is designed to be booted via a USB drive into any computer. It is a one-time run, with the Operating System erasing any sort of activity before being unbooted. This ensures extensive anonymity as no trace is left on the computer.

Also, its feature of being loaded inside a USB drive is very handy, as you could boot Tails wherever and on whatever device you like. Tails never uses the hard disk, so there shouldn’t be any issue of viruses on the computer you wish to boot Tails into.

Tails includes a Digital Security Toolbox, which contains various applications that communicate securely with each other:

  • Tails has TOR pre-installed as the default browser.

  • Ublock, a secure adblocker

  • Thunderbird for encrypted emails

  • OnionShare to share files over Tor

  • And many more

The official team behind TOR advocates TAILS as the best OS for security and anonymity to go with TOR!

Qubes OS:

Qubes OS is a free, open-source software designed specifically for security purposes. Quebes leverages Xen-based virtualization to create and manage isolated compartments known as qubes.

Quebes works on the principle of dividing the device into many smaller compartments. Due to this setup, any work done in one compartment doesn’t affect the other. So, even if one compartment gets compromised, the others stay safe. This helps us to do anything on a single physical computer without having to worry about a cyberattack taking down your entire digital fingerprints in a single swoop.

Some notable features of Qubes OS:

  • Strong Isolation

  • Multiple Operating Systems to be used inside Quebes 

  • U2F Proxy

  • Disposable Virtual Machines

Whonix OS:

Whonix is a free, open source software based on TOR, Debian GNU/Linux, and the principle of isolation. All the connections made inside Whonix are forced to go through the TOR network.

Whonix uses an extensively reconfigured Debian base known as Kicksecure. This is run inside many Virtual Machines simultaneously on top of the host OS. This method ensures that malicious attacks and IP leaks aren’t easy to take place.

Whonix itself consists of two Virtual Machines - the Whonix-Gateway, and the Whonix-Workstation.

The Whonix-Gateway runs TOR and acts as a gateway, while the Whonix-Workstation runs the applications on an isolated network.

Some notable features of Whonix OS:

  • All connections go through TOR only. No other method is allowed.

  • DNS leaks are impossible

  • Whonix runs as a VM itself inside the Qubes OS.


Tails is not meant to be an everyday OS. It will be booted from a USB drive into different computers and used accordingly. On the other hand, Qubes can be used as your main OS. Qubes also has Whonix pre-installed inside it as an extra secure OS. 

Every one of these OS has its own advantages and has been advised by cybersecurity specialists worldwide.
In Tails, one needn’t worry about leaving traces, as once disconnected, all traces are erased. In Qubes, because of its isolation principles, every process is run inside a different Virtual Machine therefore, even if one is compromised the others stay safe. 

In Whonix, everything is forced to TOR. It works similarly to a TOR-VPN client.

Qubes and Whonix are much better for anonymity, but its downside being that it leaves some traces on the hard disk. While Tails has lesser anonymity but leaves no traces.

As per your own preference and situation, you may choose to use any of these OS to guarantee a much Secure and Anonymous experience ever. 

With this, the Security and Anonymity Trilogy comes to an end!

Connect with me on LinkedIn