Hi Sl1pknot,Thanks for your message - I am hoping the fact that the very team tasked with finding exploits and vulnerabilities in Tor believe disk encryption is a good idea will clinch the issue but I won't hold my breath - no one ever won an argument!To answer your question I did use to have a Mac and Truecrypt will allow you to encrypt your entire Operating System with it. You can also create a hidden OS if that's what you want. The Truecrypt bootloader which actually asks for your password and decrypts the hard drive can't be encrypted so it would be possible to tell you've encrypted the drive. I would still recommend you do this, as it's useful in case the laptop is stolen and as I said provides another layer of security against LEO.Onto question No. 2 - the advantage of encrypting an entire USB with a program like Truecrypt is that the data is indistinguishable from the kind of data you might find if you used a special program like Eraser to delete everything on your USB - such programs overwrite deleted data with random bits of information, which are extremely similar to encrypted data.Another advantage is that you can encrypt a USB stick with several different ciphers but if you do this on a hard drive it can slow performance.If the Police ask about the USB you can simply tell them you've wiped it and certainly in the UK at least they wouldn't be able to gainsay you. How do I know this? Because I did what you've suggested here by having a USB drive encrypted with the good old 128 Bit Blowfish encryption algorithim - they kept it for 4 weeks before handing it back in disgust!As for TAILS - I think they're currently patching a security hole in this. If you do use it, I'd recommend you install the VirtualBox software on your Mac and install TAILS onto a virtual machine. Once again I recommend encrypting your Mac's hard drive, though TAILS allows you to do an encrypted install too and is very easy to set up.For now, I think you'll be fine encrypting your MacOS and having your Tor Browser Bundle / GPG software on an encrypted USB.If you need any help, feel free to send me a message.All the best,V.Quote from: sl1pknot on May 19, 2012, 11:44 pmRegistration is totally an LEO and wants everyone to stay unencrypted so we can get locked up more easily. (maybe.... lol... for all I know every other person on here is an LEO)Who cares if having your HDD encrypted makes you look more suspicious? If they can't prove you're hiding 2 things because you hand them your password for your encrypted porn folder, then they can't prove you have encrypted incriminating material. Reminds me of a situation in university- if you're smoking pot in your dorm room, and your hallway reeks of marijuana, they're going to come in your room and bust you. If your hallway reeks of febreze and cologne, they can't come in your room on the premise that you're smoking pot- there's not pot smell!I've been reading up on here for a long time and I'm under the impression that:1) I should either encrypt my entire machine and have an encrypted volume with a porn stash OR2) I should remove Tor from my HDD and keep it on an encrypted USB that also contains an encrypted volume with porn inside.but what if they find the USB? I would think an encrypted machine is somewhat less odd than an encrypted USB. Unless your story is your USB is only for encrypted porn?3) I also remember reading something that said TAILS is a good option? (not 100% on what this can do)Vlad, do you happen to have a mac? I really would like to do one of the above options, but I'm unsure which to do... Any thoughts on the correct path to being protected?