Silk Road forums
Discussion => Newbie discussion => Topic started by: mihinomen on April 21, 2013, 12:57 pm
-
Since I can't post to the main thread, I thought I'd post a followup here, get my post count up, and help the people a little. :)
Read this first (http://dkn255hz262ypmii.onion/index.php?topic=148291.0)
Depending on how paranoid you are trying to be, a reasonably safe approach is to do what Runa did to do the analysis:
o Create a blank slate virtual machine image
o Install it with the tor bundle
o Copy it to a "working copy"
o Run the working copy, do whatever it is you want to do, exit
o delete the working copy.
There are still some forensic issues with the hard-drive itself with the deleted files (which she doesn't get into in the article), but there are other tools for that.
The blank VM can be stored anywhere, and wiped if needed, and you are clean.
The issue with kernel log entries of devices is a small issue... it can potentially associate you with another device (i.e. a thumbdrive, a phone) but as long as the device isn't labeled "Secret TOR image", it's not incriminating in itself (where using tor is an issue).