Welcome tarp and thanks for your message!I take kmfkewm's point that doing so could end up being counterproductive as it might attract the attention of LEO to your IP address in the first place whereas previously they may not have taken any interest in you. Having said that Tor packets are unmistakeable so if they did analyse your traffic for any reason they'd know you had a Torified connection although admittedly it would be difficult through fingerprinting of this kind alone to prove you'd accessed a specific hidden service such as Silk Road.As for the VM, as I said at some length on another thread, I would strongly recommend using full disk encryption on your computer, even if you have a virtual machine installed.To answer the OP's question, although I access SR from both my home and the office, I would be of two minds about using public Wifi as I'd be concerned about people peering over my shoulder - perhaps this is a bit paranoid?! :-DV.Quote from: tarp on May 20, 2012, 12:03 pmAll this talk about exit relays. Why? As Vlad implied [impaled :) ], you can run a middleman relay, thereby adding to the obfuscation of the connection you are using. Furthermore, Tor can be modified to use only specific relays, or relays from specific geographic regions. Hell, it can even be tweaked to utilize more or less than the standard three hops, if you are so inclined.Your number one weapon is common sense. Don't shoot off your mouth, ensure that communication from public hotspots is done discreetly, use a VM on your PC at home, run regular wipes of temp, cached files and free space. Greets, from a long time lurker and first time poster.:)