OpSec advice. How can I run Tor from a USB stick without using a separate OS? Also a PGP question.

I have a Macbook as my main computer, and this is also what I use to go on DNM.

I'm not going to use Tails,as it's a pain in the ass to boot every time.

So the way I am doing it is like this:
I made an encrypted read/write disc image, with password protection. Then I installed the Tor Bundle into the disk image, along with all my different passwords (that I do not know off by heart). To use this, I mount the image, enter the master password, and then launch Tor, etc. When done I can unmount the image, and nobody will ever be able to crack that.

  1. What I would really like to do is encrypt a USB stick, and install Tor directly onto it. The idea being that if the police kick down my door at night, I don't have to shut down Tor and unmount the disk image -- I just simply unplug the USB stick, which should cause the browser to shut down automatically.

Has anyone got something like that working?

  1. Another question I have is about PGP. I use the GPG suite for Mac, but I am equally worried that it stores my private keys somewhere on my computer and not on the USB drive. Is there a better alternative for Mac?

Thanks a lot!


Comments


[1 Points] 63-6F-6F-6B-69-65-3F:

What I would really like to do is encrypt a USB stick, and install Tor directly onto it. The idea being that if the police kick down my door at night, I don't have to shut down Tor and unmount the disk image -- I just simply unplug the USB stick, which should cause the browser to shut down automatically.

If you're expecting this to save you from forensic analysis, then I have very bad news for you.. It won't. Even though Tor is installed on the USB, it very well can store data in RAM and in Swap (and probably other places as well)... Pulling the USB isn't going to be enough. If the solution were this simple Tails/Whonix etc... Wouldn't exist. If you don't want to use Tails, then install Whonix with VirtualBox. You aren't going to fool a forensics investigation anyway, so you might as well use Whonix and ensure that your IP never leaks in the first place. You can still use OS X normally, and use VBox to run the Whonix VMs.

Most Important: enable filevault 2 full-disk-crypto and configure your mac to delete the harddisk keys during sleep: https://apple.stackexchange.com/questions/169272/removing-filevault2-key-from-memory-on-lid-close

This will protect you from a cold-boot attack if you forget (or don't have time) to shutdown the PC.


[1 Points] darktriaddd:

Booting from tails is a pain but you're willing to go through all this shit and at the end still have not nearly as good OPSEC?

K den.