I use in-vm mounted luks partitions with tmpfs-backed ephemeral keys for browser's mount namespaces so that unless the guest vm's kernel is exploited there's no way a data can be forensically recovered from a temporary browser session. what do you use for your private browsing sessions? Im thinking switching from that to encrypting the whole vm pool, so even the guest kernel has no way to write data that's not encrypted with ephemeral key
cute
>>106748081I use other people's PCs in incognito mode at work, when they're on lunch break.
>>106749367>come to house party at a friends place>play party games on pc for a while>pc doesnt lock screen because vidya stays up>everyone decides to go outside at pool and bbq>say you gotta take a shit, go to the house alone>ctrl + a + d + enter and wipe his entire 2TB games folder, head to documents, music, videos and wipe all music, film, shows, anime he has collected>make sure its gone for good in recycle bingeg
>>106749423who you do that to friend ?>>106748081>Kani
isp still routes every packet you send/recieve to the gov for storage anal sys
>>106749423Why would you do that, you sick fuck
>>106748081how? can you post a gist or something
>>106748081i don't do anything really illegal that warrants this. i do use tmpfs for temporary stuff like keys and temp passwords. i use tails for when I want to store some data temporarily or visit boards like /b/ without shit being in my cache (I live in the UK, key disclosure laws). There's plenty of cool things I want to try, but I have absolutely no use case for them, I'm not a hacker or a CP hoarder or anybody, but I have a strong interest in hiding data.