What do you mean by ‘market’? Privacy is different to VPNs in the way that one, first and foremost, is a paid service that people are trying to make others buy. Privacy is a concept or a value, and often a cost, not a marketable product. Making people care about something takes something more like those John Oliver segments rather than a conventional market ad for a product.
But I definitely think that you have a point about the issue people have with rhetoric about privacy. Most people don’t care about privacy as an ideal until you demonstrate why it matters and how they personally are affected.
Don’t say ‘this program is private’. Not only is that a misleading description anyway (private from who? A government? Stalkers? A roommate? Bears?) but relies on them already understanding why they should care. Instead say something like ‘this program will help to stop criminals stealing your personal data and selling it to anyone who asks for it, and prevent scams or identity fraud’. Don’t say what, say why. That’s what the marketting teams on VPNs have to do, so yes, discuss privacy topics in the same say.
If they just want to launch a secure virtual machine (which may or may not be appropriate security-wise), I would use something like Whonix. It’s basically designed for that purpose.
Tails is made as an amnesic Live USB. It technically can be run in a virtual machine but it’s probably not what they need and will just be wasteful and inconvenient, unless they specifically don’t want persistence.
I would definitely not suggest running QubesOS inside a virtual machine, if that’s even possible (it’s an OS built on virtualization software, not some Linux OS).
Tor itself isn’t Tor Browser/TBB. You can use the Tor service to proxy applications through.
For example, I can simply run a program on terminal through torsocks, like torsocks git clone https://github.com/grassmunk/Chicago95
, or torsocks wget http://vww6ybal4bd7szmgncyruucpgfkqahzddi37ktceo3ah7ngmcopnpyyd.onion/favicon.ico
I haven’t checked how but you can probably configure a program or network that allows you to pick a proxy to go through the Tor network too.
Edit: If a virtual machine is appropriate (if you want a whole leak-proof Tor-only environment for browsing, email, software, etc. without rebooting), consider running https://www.whonix.org/ . You do need to launch the Workspace and Gateway OSs which will take a few seconds (a shortcut to a shell script can launch both at once) but if you are using Tor for security purposes then it might be more useful in your threat model.
My point is that “INVIDIOUS” is a very unhelpful title, and it would be helpful to edit it into something more descriptive and less clickbaity.