![]() This virtual machine should be installed inside the encrypted volume you created above. Use a desktop operating system designed to be run as a virtual machine with all traffic routed through TOR. ![]() That requires little more than ticking a checkbox and entering a password during installation – use a strong password though. If the police arrive to seize your computer, it means you've already made a lot of mistakes, but it's better to be safe.Īnother option is to take advantage of the very easy full disk encryption that is included with most Linux distributions. ![]() VeraCrypt is described as the "Open source disk encryption with strong security for the Paranoid". VeraCrypt is an open source project that replaced TrueCrypt. So you are going to be a hacker with mad skillz! A little advice then: Not Using EncryptionĮncrypt your hard disk.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |