Silk Road forums
Discussion => Security => Topic started by: HistoryRepeatsItself on November 15, 2012, 01:20 am
-
I've used tor and gpg on my machine via usb. It's not a live boot usb so I'm assuming that there are traces of both programs usage on my computers hard drives. I can not and will not be re installing my OS to remove these traces. Instead I'll attempt to encrypt the drives. I've seen threads about encrypting certain folders and files on a machine, but is it possible to do this with an entire hard drive?
If this is possible, after I've been able to do it, how does one go about setting up a dummy keyphrase that would wipe the data if I were forced to give it up?
-
Truecrypt. It has a setup where you have a hidden volume. The hidden volume is inside of a regular encrypted volume. You give one password, you get the outside, another password, the inside. And if you do it right, you can't prove that the inside even exists.
http://www.truecrypt.org/docs/?s=hidden-volume
-
If you have OSX, FileVault full disk encryption is built it but you have to activate it. I always keep this on.
Crypto-anarchism ftw.