Silk Road forums
Discussion => Security => Topic started by: ch0sen on December 04, 2012, 03:47 am
-
Was wondering how others manage tor and whatnot.
I have a truecrypt volume with a hidden volume, and in that I run a virtual machine.
Then in the VM I have truecrypt and another volume/hidden volume. In the hidden volume on the VM
I keep my TOR stuff and anything related to this.
I figure I am being way over paranoid, but they would have to find the hidden volume, start a VM and find another
hidden volume to get anywhere.
How do you do it and am I way over board with security? Is there a better way?
-
Your matroshka doll encryption scheme looks secure, but that depends on how complex your password is and other factors.
I use full disk encryption because an encrypted volume can leak info about its contents onto the unencrypted parts of the hard drive. For example, if you browse an encrypted volume with a file manager, it can create a thumbnail of an image and save it in an unencrypted part of the hard drive, or save metadata that a certain icon (such as the Tor icon) goes in a certain folder. Most operating systems also save info on recently opened or executed files, which can provide links to the encrypted volume. The safest solution is full disk encryption.
-
Anyone have a good tutorial on computer security, virtual machines, ect? I've tried offering money to people who seem to know their shit and are very reputable but nobody ever responds.