How is OPSEC?

I have an encrypted drive and a vm workstation within that drive with an offshore vpn always activated and then connecting to tor.

Is that pretty good?

EDIT: fucked up in title, meant "How is my OPSEC?"


Comments


[7 Points] sapiophile:

  1. What are you using for your drive encryption?

  2. What is your OS?

  3. What vm software are you using?

  4. What OS is the VM running?

  5. Do you keep all your software (especially Tor, but also your OS) up to date?

Proper answer key:

  1. TrueCrypt or LUKS-dmcrypt

  2. GNU/Linux (not Ubuntu or Mint) or *BSD, hopefully TAILS or Whonix Host

  3. Xen, KVM, qemu, VirtualBox, NOT VMWARE or any other closed-source vm solution

  4. GNU/Linux (not Ubuntu or Mint) or *BSD, hopefully TAILS or Whonix Guest

  5. Fuck yes, I check every damn day.


[1 Points] samwhiskey:

sure


[-6 Points] TeslaBenzo:

yeah sounds ok, where is your base PC to internet connection taking place? encrypted drives are only good if they aren't unencrypted when the get ya! hehe. I like burner laptop keep offsite, wardriving cracking wifi, never track ya that way.. Also for fun you can download CP to the persons computer you hacked into and report them to LE..(I have never done that. it would be horrible)