Quote from: cacoethes on April 15, 2012, 05:36 pmQuote from: mnightshamalon on April 15, 2012, 08:24 amHello All, I've been researching and preparing for my future on SR. Part of the preparation phase has got me asking questions about keys/bookmarks. When using Liberte, the PGP Keys,bookmarks, and any other saved data is stored on the Liberte Volume encrypted and stored on the USB storage media. My concern is if the USB stick was ever compromised and I was forced to give the password, my keys along with bookmarks to important sites would be able to be viewed. I thought about placing this sensitive information on an external HDD with a hidden volume, but Liberte doesn't offer truecrypt. I'm not the smartest guy in the world, so I always assume this question has been asked; although I have not found an answer by searching the forums. I would think this would be of concern.**Side Issue**Bitcoin runs on a VM in an encrypted volume, and connects via TOR. The VM is only used for bitcoin transactions, and wallets are deleted regularly. Are there any other better options. I'd rather not have a VM with a bitcoin wallet at all. I'm just looking for something more secure or a suggestion for that aspect of the anonyminity, or am I safe using it as is.Any help is much appreciated.ThanksI worried about not having a hidden volume with Liberte, too. My solution:I quit using Liberte on a USB drive and put it on a 4 gig micro SD card about the size of a fingernail. I could easily swallow it if I had to. No one is going to find something that small if it's hidden it well... It's amazing how much easier it is to hide an object the smaller that object is. And it is the ONLY piece of evidence that can link me to SR or any other related activity.My laptop and the encrypted USB drive laying next to it will be the obvious prizes if shit goes down, but they are only red herrings.By the time a subpoena is issued demanding that I unlock my laptop and USB drives, the real prize will no longer exist.Clever, I like it!Just for the benefit of any new users to our forum:An important aspect of Truecrypt is to provide plausible deniability for encrypted volumes -(See: http://www.truecrypt.org/docs/?s=plausible-deniability) it's trivially easy to detect a USB card or SD card has been encrypted (unless you've swallowed it!) but you can also have a hidden volume within your Truecrypt volume for your truly personal data and another containing some random important looking data. Each volume has its own password and encryption scheme and is located in the same Truecrypt container.For instance, the USB stick I use to keep my Bitcoin wallets on has this feature - if I were compelled to give up the password (as you can be in the UK), I give out the "safe" one, in which I've placed a few passwords for my Paypal account and internet banking. The "real" password would of course reveal the wallet. Most importantly it's not possible to tell the difference between a Truecrypt container that has a hidden volume and one that doesn't, a most elegant solution!We shouldn't forget either that there's no reason why a Virtual Machine/Truecrypt volume has to be on an SD card or USB stick in particular. An Amazon Kindle, iPod or any kind of mobile phone with flash memory will work just as well.V.