I have an encrypted drive and a vm workstation within that drive with an offshore vpn always activated and then connecting to tor.
Is that pretty good?
EDIT: fucked up in title, meant "How is my OPSEC?"
How is OPSEC?
I have an encrypted drive and a vm workstation within that drive with an offshore vpn always activated and then connecting to tor.
Is that pretty good?
EDIT: fucked up in title, meant "How is my OPSEC?"
[7 Points] sapiophile:
[1 Points] samwhiskey:
sure
[-6 Points] TeslaBenzo:
yeah sounds ok, where is your base PC to internet connection taking place? encrypted drives are only good if they aren't unencrypted when the get ya! hehe. I like burner laptop keep offsite, wardriving cracking wifi, never track ya that way.. Also for fun you can download CP to the persons computer you hacked into and report them to LE..(I have never done that. it would be horrible)
What are you using for your drive encryption?
What is your OS?
What vm software are you using?
What OS is the VM running?
Do you keep all your software (especially Tor, but also your OS) up to date?
Proper answer key:
TrueCrypt or LUKS-dmcrypt
GNU/Linux (not Ubuntu or Mint) or *BSD, hopefully TAILS or Whonix Host
Xen, KVM, qemu, VirtualBox, NOT VMWARE or any other closed-source vm solution
GNU/Linux (not Ubuntu or Mint) or *BSD, hopefully TAILS or Whonix Guest
Fuck yes, I check every damn day.