Quote from: registration on May 20, 2012, 06:28 pmCan you show me what information is leaked to my OS after I have closed down TOR browser bundle? As far as hush goes I'm not even going to elaborate your right I'm a lemon.....All you have done is gone "technical" a few times and posted nothing but unrelated nonsense and a whole bug report of Tor Browser that applies even when your in a hidden volume. If you don't understand that what you post is also applicable when your mounted in your hidden volume then where do I have to start?To be honest I actually thought for a second you knew what you were talking about but I am kind of disappointed.Actually i should not be surprised because by your postcount it appears you spend way to much time on these forums and not enough time studying security measures. As a matter of fact I'm actually willing to admit I was completely wrong If you show me;Can you show me what information is leaked to my OS after I have closed down TOR browser bundle?.....................with source that is ;)Comprendes amigo??I've already answered your question - no please show me a security expert who agrees you should store your GPG secret keys via Cloud Computing.I'm touched you've been reading my post count - perhaps if you'd taken the time to read a few you'd know a little more about taking your security and others more seriously. :-)V.