Quote from: registration on May 19, 2012, 10:46 pmQuote from: vlad1m1r on May 19, 2012, 10:35 pmOK, I didn't want to have to get technical about this as it's a little unfair on everyone else but so be it.Firstly, the Tor browser is designed with the ultimate goal of not leaving any fingerprints on the host Operating System -they frankly admit they haven't achieved this yet, by all means take a look at their page:https://www.torproject.org/projects/torbrowser/design/#securityYou'll see that they link to a number of sites designed to test your privacy, one of which is browserspy.dk which will clearly show your browser retains cookies.By default Javascript is enabled in the Torbrowser which can leak your IP information and there are plans for supporting flash objects.The Tor project also posts a link to a site which contains scripts which can also detect the presence of the Torbutton and reveal your history to a limited extent, although admittedly this could be done remotely, not by seizing your machine:http://pseudo-flaw.net/content/tor/torbutton/When it comes to security less is not more, more is more. None of this means you shouldn't make sure to keep updating to the latest version of Tor browser to prevent remote exploits, but as I said encrypting the partition on which you keep your Tor browser bundle is a matter of common sense.Those people who have read my posts will know I'm not given to paranoia or stupidity, I honestly believe the only way to be sure forensic recovery of your browsing activities cannot take place is to keep your web browsing application out of reach - this is not a particularly sensational point of view and I'm by no means the first person to say it!V.Quote from: registration on May 19, 2012, 10:23 pmI don't understand what's naive about saying that if you surf the web using TOR browser and don't add anything to your bookmarks and don't download anything once you close TOR browser everything about that particular session is GONE and IRRETRIEVABLE.That's what TOR stands for. All your internet traffic is encrypted.Furthermore I believe more security can also come from less. Because as you know less is more.A hidden truecrypt volume invite the user to download a bitcoin client, safe sensitive information on his HDD, add bookmarks to TOR all under the notion he is safe but he couldn't have been more wrong (refer to duckduckgo for all the different attacks). He was simply a naive boy sitting behind his desk playing 1337.Do you really believe that? Encryption does not help you at all with that. Those exploits are general TOR exploits they also apply if your in an encrypted drive that does not change anything.As for the document you provided indeed read it through and see that they have disabled cookie retention at all so again..I repeat...once you close your browser NOTHING is RETRIEVABLE.:)And I repeat that that is a load of RUBBISH - deleted data CAN be recovered if only removed using the methods stated by the Tor browser!V.