[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology

Name
Options
Comment
Verification
4chan Pass users can bypass this verification. [Learn More] [Login]
File
  • Please read the Rules and FAQ before posting.
  • You may highlight syntax and preserve whitespace by using [code] tags.

08/21/20New boards added: /vrpg/, /vmg/, /vst/ and /vm/
05/04/17New trial board added: /bant/ - International/Random
10/04/16New board for 4chan Pass users: /vip/ - Very Important Posts
[Hide] [Show All]


[Advertise on 4chan]


File: 1767004794694373.png (1.65 MB, 1920x804)
1.65 MB
1.65 MB PNG
I use QubesOS with detached boot partition on 2 duplicated USB drives with any data that rests on the SSD/HDDs being encrypted with LUKS2. Whonix gateway is proxied through a VPN qube to hide Tor IPs (can't hide communication patterns) without bridges since bridge IPs can be farmed. Sometimes I2P outproxy through Tor through a VPN or similar setups with different anonymizing network overlays. Clients used for browsing are only opened in ephemeral disposable qubes whose one-time random 256-bit encyption keys reside on a tmpfs, with no unencrypted access to a permanent storage; or in entirely on-RAM disposable qubes to hide storage device wear statistics and other side channels. Attack surface is quite minimum since no extra things added like USB keyboard and no PV qubes (aside from sys-usb and sys-net) are used for launching HVM qubes with qemu stub domains unless very necessary and every other qube on the system gets shut down first to keep information leakage minimum. A veracrypt volume with hidden storage on a permanent qube for data storage and plausible deniability. Screws are painted with nail polish to ensure physical tamper evidence.

what's your setup like?
>>
All meaningless because your CPU has a hardware backdoor that can easily override any encryption.
>>
>lust provoking image
>>
organic thread, bro
>>
>>107883710
you trust systemd?
also datamining thread
>>
>>107883710
>Screws are painted with nail polish to ensure physical tamper evidence.
why don't you just install an airbag inside the case so it explodes when somebody is opening it?
>>
>>107886469
https://github.com/maqp/tfc
>>107887389
where did systemd come up?
>>107887522
ram killer is enough, I dont want to carry a bomb



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.