To view the list of links, please access this site using Tor Browser.
If you’re seeing this message, access is restricted for regular browsers.
Already using Tor? If you are sure you’re currently in Tor Browser, proceed to our .onion version:
I’m on probation for a cybercrime offense and so my threat environment is basically my PO walking in on me while I’m using my laptop. I am allowed to possess a laptop, but I am obviously not supposed to be using tor browser, virtual machines etc etc. the specifics of this haven’t been discussed and never will be. My PO just assumes I use my laptop for school but I know at any point he may become inquisitive.
My host OS needs to be windows, for sake of looking like a normal person. I do not want to use Mac OS because that would imply I have extra $ and I don’t want give that impression. I would normally use Linux for my activities
My idea is to have normal Windows junk OS, but have small USB drive in which I run Puppy OS off RAM, with my persistence encrypted. My thinking here is if there is an unexpected visitor, I can unplug the USB while I’m logged in and program a killswitch in Puppy to initiate shut down if the USB becomes unplugged. The downsides to this is the need for a USB stick, and lack of ability to encrypt the entire USB drive. The pros are that since puppy runs in RAM, a sudden unplugging of the drive shouldn’t corrupt my files, especially with a killswitch.
I was considering having regular dual boot on the laptop, but this is easily detectable by anyone with physical access to the device. I am not necessarily concerned about FBI level forensics, but a step just below that.
If anyone has any ideas or feedback please let me know. Regards