2686
Security / Re: How to delete all traces of TOR
« on: December 28, 2012, 10:42 pm »If you dl'ed the correct version of Tor, you could run it a True Crypted USB drive as I do. This leaves no trace of tracks locally on any computer, makes it very portable and when you shut it down, there is NOTHING to uninstall or for others to find.
Technically not true at all...
Windows especially, writes tons of junk everywhere, though most of the time it's fairly harmless, records of exe paths etc
If you do more risky stuff like copy/paste/"file open" pictures etc from tor to your thumb etc more records and possibly even temp files etc could be saved.
Yes, there's too much data leakage from encrypted volumes (files, partitions, external media) to make them safe. See the discussion I had with someone here:
http://dkn255hz262ypmii.onion/index.php?topic=71415.msg686230#msg686230
The only real way to have a completely TORless system is to not download or run it on your computer. Use a VM or a Live USB OS (like linux) to download run/setup and use Tor. Even then encryption is still highly suggested since these are more "stealth" security, you also want "lock/key" security if found.
I believe full disk encryption is safe as long as the device isn't on when LE arrives, so they can't extract the encryption key from RAM, but realistically speaking, the LE that pursue a drug buyer or low level drug dealer won't be sophisticated enough to do that, so I believe full disk encryption is safe in our threat model. Although, as discussed in the link above, an OS on real-only media or in a VM with FDE are the strongest protection.