Silk Road forums
Discussion => Newbie discussion => Topic started by: ACentreForAnts on August 05, 2013, 03:26 am
-
Hello, I'm trying to create a secure OS that I can use, whether it be via USB (Tails, Liberte Linux, etc.) or a new partition on my hard disk. Trouble is I know fuck all about what I'm doing.
I want it to be a hidden TrueCrypt volume. My computer is a Mac so I'd presumably be using Bootcamp? The thing is, I know from messing around with TrueCypt in the past that hidden volumes look dodgy—let's say your hidden volume is 5 GB, but your shell is only 1 GB. Well, anybody with basic maths skills is going to see that 6 GB of space is missing from your hard disk/USB, and if you're forced to give the password to the shell, they'll see that 5 GB is still unaccounted for. How do I create a hidden TrueCrypt volume that doesn't conspicuously take away from available space?
Then there's the question of installing and booting off a USB—I've restarted whilst holding down the option key and the Tails iso doesn't show up as a bootable volume. I can't even get OpenBSD to download (I've tried many mirrors) so I've given up on that. I've considered other versions of Linux but I lack even a rudimentary understanding of this.
Help that I can understand, please? I still don't understand how PGP keys work... at all... so as much as I hate to say it, you'll have to dumb it down a bit. Sorry, and thank you.
PS On a separate note, I've been told that my Mac has been keeping track of everything I do, and that anybody who seizes the hard disk could hack into it and see the trail of my activity (including visits to TOR pages and such). How do I sanitise this and stop it from happening in the future?
-
Bump? (It was buried on the 3rd page and I figured nobody would see it ever again.)
-
Seriously, this is bullshit. Do you guys get off on the idea of people ending up in prison or what? I can't fucking handle any of this.
-
Thanks.
-
You should be able to use TrueCrypt to make a second hidden volume inside the hidden volume. So, you make a dummy partition with something legal that you'd have reason to hide, maybe porn or something, and then have a separate one for anything related to here. Then, if you happen to get caught and are forced to reveal your password by court order, you can simply give the password to the dummy partition and they'll assume the embarrassing porn or whatever was the reason you had a truecrypt drive in the first place. There should be detailed guides on how you can set this up.
-
You don't need a Truecrypt volume if you use Tails and enable the persistent volume. That will be your encrypted volume.
An encrypted volume or file can leak data onto the rest of the hard drive, so it isn't safe anyway. You should either use full disk encryption, or the persistent volume in Tails, where there is no unencrypted media to leak info onto.
As for getting Tails to boot on a Mac, I have heard that's a pain. Read through the Tails thread that's linked on the main site. Lots of people have discussed that problem in the thread.