I use QubesOS with detached boot partition on 2 duplicated USB drives with any data that rests on the SSD/HDDs being encrypted with LUKS2. Whonix gateway is proxied through a VPN qube to hide Tor IPs (can't hide communication patterns) without bridges since bridge IPs can be farmed. Sometimes Tor through I2P outproxy or vice-versa or with different anonymizing network overlays. Clients used for browsing are only opened in on-RAM ephemeral qubes with no access to permanent storage. Attack surface is quite minimum since no extra things added like USB mouse and no PV qubes (aside from sys-usb and sys-net) are used for launching HVM qubes with qemu stub domains unless very necessary and every other qube on the system gets shut down first to keep information leakage minimum. A veracrypt volume with hidden storage on a permanent qube for data storage and plausible deniability.what's your setup like?
>>107664217You sick fuck
I completely adjusted my life and maintain a lifestyle where I have absolutely nothing to hide. My setup for security and privacy is to be an open source human.
>>107664217>lust provoking image
>>107664217okay. sure. we also instinctively know your porn habits too.>it's p
>>107664731what does someone's porn habit have to do with security and privacy?
>>107664217>A veracrypt volume with hidden storage on a permanent qube for data storage and plausible deniability.isn't this bad opsecthe permanent qube will leave crumbs identifying a hidden volume
>>107664945it is. it's a compromise.
>>107664758A lot actually, even if not mutually exclusive.
>>107664275umm... but that's a child?