I use QubesOS with detached boot partition on 2 duplicated USB drives with any data that rests on the SSD/HDDs being encrypted with LUKS2. Whonix gateway is proxied through a VPN qube to hide Tor IPs (can't hide communication patterns) without bridges since bridge IPs can be farmed. Sometimes Tor through I2P outproxy or vice-versa or with different anonymizing network overlays. Clients used for browsing are only opened in on-RAM ephemeral qubes with no access to permanent storage. Attack surface is quite minimum since no extra things added like USB mouse and no PV qubes (aside from sys-usb and sys-net) are used for launching HVM qubes with qemu stub domains unless very necessary and every other qube on the system gets shut down first to keep information leakage minimum. A veracrypt volume with hidden storage on a permanent qube for data storage and plausible deniability.what's your setup like?
>>107644821well I got linux but I'm not using a vpn or anything.
>>107644821Posted it again award
>>107644821Sick fuck
>>107644821shut the fuck up nerd
>>107645346>post /g/ content in /g/>get called nerd
>>107644821>Qubes OSmeme malware that includes nonfree blobs
>>107645700your blob free cpu and pci devices have known vulnerabilities that not only sophisticated gov agents can break thru but 15 yos from their moms' houses can too
>>107644821This girl is legal now