Quote from: TreyWingo104 on May 10, 2012, 08:34 amQuote from: dudeguy551 on April 17, 2012, 05:16 amQuote from: greatgreatgrandpa on April 17, 2012, 04:47 amgiven recent events on tor sites, i would invest in a flash drive bro, keep it on there, AES its ass, and worry no more about your compif you are going to encrypt a partition on your hard drive, encrypt the whole drive1LRnC74rxWVZ5bCtEMpLXLPaua6GHEAfX6its the best advice you'll get, its how we all do it!welcome to the roadIf I don't encrypt/partition my drive, what areas should I remove the data (with multiple algorithm formatting)? Like my firefox doesn't keep history (tor bundle) but I always felt there were other things I should be purging of vital data. Do I need to hide the tor executable inside an encrypted partition to prevent ISP scans? Or is that not of this time yet?Do I need to scrub firefox data? Or filter/route my outgoing traffic further to prevent my ISP reporting "tor" usage?Your ISP will know your using Tor no matter what....the third part will give you some more privacy....look up aircrack ng and find out if your card works with any of the versions. Honestly you can save yourself some time and work by just buying a setup from Ebay, a good one will support injection and come with a good directional antenna. Using aircrack you can brute force WEPped networks or just find existing open networks. Once you inject and crack it open you dont have to worry about your ISP anymore.spoof your Mac address if you want additional security. Honestly I would highly reccomend this. any 802.11 wirelessly connected machine broadcasts its Mac ID in the header of its connection, so if you crack open some wifi and use it you're gonna want to spoof your Mac ID too.Greatgrandma/grandpa! sorry I never hit you up with the coin cause you didnt really explain what I needed at the time, no hard feelings I hope, the advice was appreciated and all. Im going to get an ironkey and add 2fish serpent to the AES and use tails until Liberte addresses the Midori issues and DNS leakage....I still want to know how to TC a hidden volume within the hidden OS though>Welcome to SR TreyWingo04,I think you can save yourself a Bitcoin by visiting the Truecrypt HowTo section to get yourself a Hidden OS:http://www.truecrypt.org/docs/?s=hidden-operating-systemDon't ignore the preamble, as it makes for important reading - this tutorial applies to Macs/PCs only of course. I would say that this is unnecessary though because you can always use a TC partition to store your Tor browser/PGP Software/Bitcoin wallet.Creating a Truecrypt container with a hidden partition is very simple and once again there's a very simple tutorial for this on the Truecrypt website:http://www.truecrypt.org/docs/?s=hidden-operating-systemFrankly I think the second of the two is much easier to set up and can be just as secure - in fact I keep all my SR related software and information in a 1GB container in my (encrypted) home directory. The advantage of course is that if LEO tries to force you to reveal the password you can make sure to give them the "safe" one which will reveal harmless dummy data.With regard to the Ironkey, these are an excellent form of security but I am not sure these can be formatted to hold an OS as you would need to be able to boot from the USB drive in order to use it and as far as I can tell you can only decrypt the drive from within your own OS.What you may want to do is put a Truecrypt container on the drive and as I said install your standalone applications inside it, so that they can only be accessed by the Ironkey. Feel free to create a container using AES/Twofish/Serpent as you say and of course your password to access the container should be different to the one you use to access the Ironkey.V.