Critique my DNM client set-up

I've finally decided to take security seriously in accessing DNM and accordingly taken some measures towards that goal.

My PC runs on Windows 8.1 x64 . On that PC I have decided to conduct no access of Tor or DNM outside of a single VM running on VirtualBox. This VM is running Ubuntu (latest release) 64 with full-disk encryption on an LVM-managed root partition. I have strong passwords for both the disk and the only user account on the machine. I've also encrypted my home drive. From there I installed tor browser using the instructions on torproject.net .

My questions are:

1) Do you think this offers me near-surety that at least a thief of my hardware could not determine my usage of Tor outside of network activity logs from outside the PC itself (say, those of the routers in the path to the Tor router)?

2) Is there anything I could do further that would greatly enhance my anonymity as a Tor client?


Comments


[1 Points] fredster251:

A better question would be: why can't you just use tails off a USB stick? (Or, what advantage does your setup have, apart from a minor convenience over Tails)

1) Depends what firewall you are running on the host machine. 2) See above


[1 Points] FriendlyDrugAddict:

You could find a good vpn which would hide the fact that you are using tor, but using tor isn't illegal.


[1 Points] al_eberia:

Do you live in a jurisdiction that will require you to handover encryption passwords to the police?


[1 Points] None:

Instead of all that just get TAILS and use PGP


[0 Points] jadedsynk:

Both windows and ubuntu arn't very secure OS's.