Quote from: mdmamail on April 21, 2012, 08:50 amQuote from: mnightshamalon on April 21, 2012, 07:26 amThanks again for all the replies. I'm in the process of building LIberte from scratch with bitcoin and truecrypt, I coudln't load electrum because it's not in Gentoo's package list. This thing is taking a long time to build, but I guess that's normal.Any whoo, I'll put some instructions on here if it works or once I'm done and have found the solution. Would anyone like this in an ISO? I was thinking of doing it but I don't know how comfortable people would be downloading an ISO of an OS they didn't build themselves. Either way I'll at least put some instructions if it doesn't fail.I did catch one thing tho, If I understand the Truecrypt documentation correctly. **CLEAR LINK http://www.truecrypt.org/docs/?s=wear-leveling** We aren't suppose to store these file containers on USB flash drive because of wear-leveling, this isn't just for the whole USB drive, I think this is for the encrypted file containers stored on the flash drive as well. But it's a bit miss leading because it says on the main page, "A TrueCrypt partition is a hard disk partition encrypted using TrueCrypt. You can also encrypt entire hard disks, USB hard disks, USB memory sticks, and other types of storage devices." So then, I must have missed something, all USB drives use wear-leveling now so it must be ok to use the encrypted file container? Maybe they mean encrypting the entire USB drive as opposed to a file container on the drive. I hope that is what it is.Also, Truecrypt says not to write to the outer volume or I could damage the hidden volume. So when the wizard asks me to put files on the outer volume, that is the only time I can put file on? I thought I could use place files on there after. That's not too much of an issue tho..-mnight"If you need plausible deniability, you must not use TrueCrypt to encrypt any part of (or create encrypted containers on) a device (or file system) that utilizes a wear-leveling mechanism." which is basically SSDs and MicroSD or USB. Buy an Ironkey, though it doesn't work with Liberte without root password. Works on Tails though.Can always make a small TC container and upload it somewhere over Tor then download it anytime you need it, dropbox, wuala or as an email attachment. And yes you can break your inner container by adding new files to the outer one unless you have plenty of extra room.Well said mdmamail,I use an SSD* on my laptop and it is something of a pain as far as encryption is concerned as the wear leveling mechanism won't work effectively if you encrypt the entire disk. Conversely if you only encrypt part of your system with Truecrypt you can risk exposing a hidden volume (recovery of the data itself would be almost as problematic as on a regular hard drive though.) Since I use an SSD, I have adopted a "belt and suspenders" approach through placing a Truecrypt volume inside an encrypted Home directory in Ubuntu which is very easy to set up. It would be trivially easy for anyone who seized the machine to detect their was encrypted data on it but the Police here in the UK lack the resources and the skills necessary to bruteforce their way in - I should stress that the same isn't necessarily true for those of you who live in the US!V.*Solid State Drives operate along the same principle of USB flash drives but are in the form of hard drives which can be put into laptops and PC's, the advantage being they are much faster than regular mechanical drives, the downside being that they cannot be written to indefinitely.