If you want to run a VM in Parrot as a live, encrypted-persistent installation (from USB drives) (virt-manager is the only VM that Tails recommends for an encrypted-persistence installation), download virt-manager through the Synaptic Package Manager. Just type “virt-manager” in Synaptic’s search dialogue, and viola! See my post even if you run an OS in your VM other than Tails: -->> Running Tails in a VM inside Parrot 3.11
See also:
-
“We do not currently provide a solution for running a virtual machine inside a Tails host. See #5606 (https://labs.riseup.net/code/issues/5606).”
-
“Security Considerations (https://tails.boum.org/doc/advanced_topics/virtualization/index.en.html#index1h1)”
-
VirtualBox is available for Linux, Windows, and Mac. Its free software version does not include support for USB devices and does not allow to use a persistent volume. See the corresponding documentation (https://tails.boum.org/doc/advanced_topics/virtualization/virtualbox/index.en.html).
-
GNOME Boxes is available for Linux. It has a simple user interface but does not allow to use a persistent volume. See the corresponding documentation (https://tails.boum.org/doc/advanced_topics/virtualization/boxes/index.en.html).
-
virt-manager is available for Linux. It has a more complex user interface and allows to use a persistent volume, either by:
-
- Starting Tails from a USB stick.
-
- Creating a virtual USB storage volume saved as a single file on the host operating system.
-
- See the corresponding documentation (https://tails.boum.org/doc/advanced_topics/virtualization/virt-manager/index.en.html).
I’m reluctant to run any 3rd-party, standalone VMs in Parrot (e.g., Whonix) because I don’t know how they will affect Parrot’s security.
Before you go online with whatever you run in your VM, be sure to run the tor daemon (sudo service tor start ^enter> sudo service tor reload ^enter>) in order to anonymize TCP. This will not route your traffic through Tor, but it MAY preclude your OS running in VM from leaking your MAC address (I haven’t gotten a definitive answer on this yet -->> Anonymous Mode Will Not Restart).
To hide your true IP address, either run a VPN, or skip the Tor daemon startup, and simply use “Anonsurf start” (select “No” for cache clearing, etc.). However, I typically avoid using Anonsurf until I’ve updated Parrot and downloaded any additional packages, because a slow Tor connection can mess that up.
Also, if you use Tor in your VM along with having Anonsurf running in your host OS (Parrot), you’re doubling-down on Tor’s latency. Regardless, I have run Tor-to-Tor this way, which offers some protection against hostile Tor nodes (assuming a hostile Tor node operator on your VM’s exit-node end can’t trace back through your host’s Tor circuit).