[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology


Thread archived.
You cannot reply anymore.


[Advertise on 4chan]


File deleted.
I use QubesOS with detached boot partition on 2 duplicated USB drives with any data that rests on the SSD/HDDs being encrypted with LUKS2. Whonix gateway is proxied through a VPN qube to hide Tor IPs (can't hide communication patterns) without bridges since bridge IPs can be farmed. Sometimes Tor through I2P outproxy or vice-versa or with different anonymizing network overlays. Clients used for browsing are only opened in on-RAM ephemeral qubes with no access to permanent storage. Attack surface is quite minimum since no extra things added like USB mouse and no PV qubes (aside from sys-usb and sys-net) are used for launching HVM qubes with qemu stub domains unless very necessary and every other qube on the system gets shut down first to keep information leakage minimum. A veracrypt volume with hidden storage on a permanent qube for data storage and plausible deniability.

what's your setup like?



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.