Opsec/Tails versus Truecrypt

So I have a mac, no pc. booting tails on a mac requires refind and frankly I'm a bit uncomfortable installing it, I've seen reports of it corrupting some macs.

My question is as such: If I have a truecrypt container with a very strong passphrase, and everything dnm-related inside said truecrypt container - is this any worse than tails? Ie, the truecrypt container has a hidden partition and a "bullshit" partition including would-be sensitive information like my credit card numbers and social security #.

Anyhow, I know at the very least that the idea isn't crazy, but what i'm looking for is if somebody could tell me how this is an inferior solution to tails, i.e if somehow some data could "leak" and ultimately be recoverable should an... adversary have the motivation to find some.


Comments


[2 Points] up---__down__---up:

!


[2 Points] galaxyandspace:

Short answer: not secure.

The main issue with using Mac: parts of the Mac OSs are closed source. You have no idea how much/what data Apple collects and sends to the NSA or other letter salad agencies around the world. No clue. That alone is enough to make me uncomfortable.

Furthermore, most Macs share very similar hardware, making the lot of them easy targets for hardware exploits.

If your OS or hardware is spying on you, the fact that you are using truecrypt is pointless. They pop a keylogger on your system, and it's all over.

Now if you don't want to rewrite your boot loader, you can always dual boot ArchLinux on a Mac, harden it, and virtualize Whonix on top. Now your as secure (if not more) then TAILS (which is a branch off of Debian Linux).

TL;DR? security is hard, and complicated, especially for Mac users.


[1 Points] Samnite4Life:

Just use Tor browser bundle for personal amounts. If you plan on reselling or vending, get a used PC laptop and set up Tails.