What is a safe Axle will fit my needs?

Greetings to all. Happy to be a part of Your community :)

I had the problem , - work with computer with constant use tor and storing some files.
At first glance, everything is simple, but I will explain. Work often using TOR and files to be stored , not many. But you want the computer not leaving traces after reboot (in addition to the permanent files which must be encrypted). That description fits a lot of the OS running live-usb on every order. Thinking about tails, there is a built-in tor and persistent partition is ready, in principle, suitable, but there is not to fasten VPN over TOR , so the ISP sees that traff goes through tor. I got the idea to tie the vpn to the router (because always travel I use a 4g router) to find a way to tie VPN and router vpn the way , too.

Further tested Kodachi , all great, but in no way was able to find how to add Russian keyboard layout and do not understand how to create a permanent partition on a flash drive with a system that will be encrypted.
Moreover, with the new path, these problems have been the only one. But when loading from the stick she sees not itself 4g router usb or Wi-Fi module. (apart from the lack of layout).

So the question is. What will fit best under the objective of the work vpn with encryption store (I even don't need more than 500MB) , with self-cleaning system (like RAM and the file system itself with the exception zashifrovannoe)

And subforos. If the main OS is win 10, on it virtualbox which is the same Kali , tails or kodachi. Is it possible to detect the traces of files or info of these OS out of the path. If Yes , how to prevent.
June 5th 19 at 21:06
7 answers
June 5th 19 at 21:08
You for what "traces"are you afraid of?
History, cookies and other of the same Torah? Well, you have to mount the folder where he keeps on tmpfs when they restart it will not.
To hide specific files? Well, truecrypt or his heirs.
To use you can any sort of system that you want to configure. Though banal Ubuntu.
Any stored? Including documents , which, although encrypted in themselves, but are displayed on the screen, they are in RAM, right?

Well, you have to mount the folder where he keeps on tmpfs when they restart it will not.

I'd rather not blacklist ( which is removed) and white sheet (1 folder which remains)
But nevertheless, please tell me how to mount it? - casey64 commented on June 5th 19 at 21:11
and self-googling "ubuntu mount tmpfs"?
According to the statement of Pro RAM - you read a lot good... - chelsea13 commented on June 5th 19 at 21:14
On expert do not apply. Thanks, will read it all useful.
And to the question "self-googling "ubuntu mount tmpfs"?"
It's interesting that on sites where asking questions of knowledgeable people , one of the most popular answers, "why not Google itself". - casey64 commented on June 5th 19 at 21:17
you are not sent to Google yourself, you were given a ready-made query that is more information than I can Topstitch over night. Including (if you specify the query to those parts that I had would have to clarify) exactly what you need.

And yeah, really funny that people who do not claim to experts on the issues that are really interested in, so easy to make psychological generalizations based on only one's own hurt pride...

Speaking of psychology: you know that now in any browser is private mode, it is designed not to leave traces? - chelsea13 commented on June 5th 19 at 21:20
,
Speaking of psychology: you know that now in any browser is private mode, it is designed not to leave traces?

you know about browser fingerprinting, right?) - Zit commented on June 5th 19 at 21:23
I also know that the Toaster is quite the passionate young men who can start a similar movement just in order to download and store porn unbeknownst to the parents ;)
The specific decision, as we understand it, depends on the specific task. - chelsea13 commented on June 5th 19 at 21:26
Here , nightmare. I think You are exaggerating. - casey64 commented on June 5th 19 at 21:29
you, for example, suggested that for your purposes you need a special OS.
I called a couple of tools that solve the same task under any Linux...
They may not cover all your needs, but for some reason I am sure that the specialized OS to your needs does not exist. - chelsea13 commented on June 5th 19 at 21:32
,
good luck, I am also aware that the Toaster is quite the passionate young men who can start a similar movement just in order to download and store porn unbeknownst to the parents ;)

So why download and and store? There are plenty of convenient online services) - Zit commented on June 5th 19 at 21:35
I'm afraid I can't satisfy your curiosity. I'm no expert on porn, nor online services for storing your media. Somehow there was no need until now... and puberty I ran out before the appearance in Russia of broadband Internet. - chelsea13 commented on June 5th 19 at 21:38
June 5th 19 at 21:10
Any OS that is being developed in Russia, the best, comrade major!
June 5th 19 at 21:12
Not advertising. I think you will find useful

telegra.ph/Oc-05-09

And a little more

telegra.ph/Anonimnost-04-19
June 5th 19 at 21:14
Take any distro. Better Ubuntu for the beginner it will be easier and soft with no problems. And even better Xubuntu to not have performance issues.
Use VirtualBox. When you create a virtual disk, including the encryption. With Ubuntu, too, including encryption.
In the end you will receive encrypted virtual disk within the encrypted container. Where else sifrovanie?

As the host and guest OS:
Turn off hibernation and standby.
Disable paging. NO PAGING, YOU HEAR?! Neither in the file nor on disk.

Put yourself and the attitude of the vpn, tor and privoxy - manual the network is full.
Don't forget to check via DNS leak and WebRTC.
Don't open the browser to full screen or make the panel non-standard width.

> self-cleaning system
You don't need it. Or you are mistaken or have already butted. But ispolzvat tmpfs, as already advised above.

> except zashifrovannoe
There is no "except zashifrovannoe" memory you shouldn't be in principle. The whole disk is totally encrypted. Can you take a hamster on a flash drive, which also do encrypted through a normal application for the Ubuntu discs. Do not worry with hardware-based encryption in flash drives. It is either implemented with errors (which is rare), or it is not at all as most of these flash drives (stupid controller is disabled for the pin). These flash sales only. To store files to use them not worth it.

And Yes - you want some kind of paranoid OS but to run you have going under Windows? This is ridiculous.

And just remember - all these measures will not protect you. They will only deprive the court of additional, obscure and not necessarily evidence.
Will prokelisia you something different - mix up the accounts using one and the same service from two operating systems simultaneously, you can use double sided clipboard clipper for him on the host that will trigger opponents to use against you sophisticated attack, such shaping...
But most likely somewhere to brag and tell me all about myself.
So you better not do anything that may not like our government. Especially if it's not illegal ;)
June 5th 19 at 21:16
The easiest way in all the plans with the least number of movements:
1) Buy Kingston DT2000/16GB or similar. Hardware encryption, pincode to decipher if the pincode entered 10 times wrong data is destroyed without possibility of recovery.
2)* Take any convenient distribution and preferably sharpened by liveusb. You can collect your own, or get something ready https://en.wikipedia.org/wiki/List_of_Linux_distri...
3) to Put in and configure in this quick all the necessary software.
4) to move to tmpfs, all you need (using overlayfs kernel\unionfs).

*you can push all in cpio with the proper skill but a matter of convenience updates\migration\installation of the software will be uncomfortable. In this respect, the overlayfs kernel\unionfs which W is in tmpfs is much easier, you have something to update\reconfigure\install simply ammonium overlay and all.

If you wish to store the user files can be codelib mount a EncFS (on a partition of the same USB drive\hard\but at least on the webdav from any Yandex) right directory.
1. How to do encryption on hardware level, and whether it better than softwaree?
Further, I understand that if 10 incorrect attempts, she just formatted and the files are being restored. Or she's right she will randomly overwrite the info?)

And paragraph 3. Knowing what you need to put soft I like (For auto-VPN + tor at system startup, wipe ram every time to do autodelete the whole info, in addition to constant info.

4. Gone Google, what is tmpfs. - casey64 commented on June 5th 19 at 21:19
1. The encryption key is divided into 2 parts, one is your pin, and the second somewhere in the bowels of the device. 10 incorrect and the second part is not. - chelsea13 commented on June 5th 19 at 21:22
And without the encryption key data is "random info". - casey64 commented on June 5th 19 at 21:25
BitLocker for example? Or about like Trucrypt - chelsea13 commented on June 5th 19 at 21:28
under 3 and 4, means the following:
- On the drive root shared partition with installed OS and software
- on top of the overlay. The bottom layer is the root of the flash drive, the top pokes in tmpfs. The overlay makes the main point of the mount as ro and the upper layer as rw which then will indicate who lives in a tmpfs RAM. In the end, all the change fly to nowhere after turning off. If you have something to fix\update\atminties to install the overlay and everything will be written already on the physical level as on a flash drive. - Zit commented on June 5th 19 at 21:31
It depends on what TC would do if for example to run software, which are available for old hardware, this software can pass the old major and the next time not with flash, but with a working OS, the same software will transfer the info, but associated with the identity of TSA and if in the first case he was doing something illegal, the session termorektalny cryptanalysis will not keep you waiting. - chelsea13 commented on June 5th 19 at 21:34
Strictly 2 devices, one of which without access right to connect to the network.
A termorektalny cryptanalysis has not been canceled. It is important to avoid. - casey64 commented on June 5th 19 at 21:37
June 5th 19 at 21:18
Can certainly banal. But the goal will not leave traces in the country of residence. If so order a vps from foreign providers .Trial version you kindly put a server work on health through a secure channel. Go TTS and konekt. If too much paranoid .The query what makes Bob Pushkin and it is very interesting infa is unable to send but leaves no doubt that answer.The point is to keep the data away from yourself. But to have access to them at any time
June 5th 19 at 21:20
however, there is not to fasten VPN over TOR
A VPN over TOR is much more effective to tie on the router.

Is it possible to detect the traces of files or info of these OS out of the path. If Yes , how to prevent.
Yes.
Virtualbox is a process in your system, which allocated virtual memory. As part of the virtual memory hits the swap file. It is difficult to predict what to get, how valuable it will be, but theoretically such possibility is.

In any case - no matter how you encrypted, in the majority of cases simpler, cheaper and more profitable to ask the right information from you rather than to pick out it from the system.
Thank you for your answer. But as already written above , few routers support VPN.
Exactly portable. - casey64 commented on June 5th 19 at 21:23
Use proxies and rented VPS. - chelsea13 commented on June 5th 19 at 21:26
what logatskaya the relationship between hardware router on which it is possible to omit the traffic through the VPN with a proposal to buy a paid VPN? - casey64 commented on June 5th 19 at 21:29
I have no idea. - chelsea13 commented on June 5th 19 at 21:32

Find more questions by tags LinuxCryptography