Archie on Nostr: Tails OS on a USB key with persistant storage that contains : - BelenaEtcher - ...
Tails OS on a USB key with persistant storage that contains :
- BelenaEtcher
- Bitwarden (to store all your passwords locally)
- DBAN
- Ventoy
- Veracrypt
- ISO Tails OS
- ISO Ubuntu/Kali/what you want
- Softwares of your wallets
- Your PGP key + Revocation certificat
Put an omega strong password on top of that.
Remember it is the best way not to leave any hints, exercice yourself to remember it every two days, or more depending on your own confidence.
If you feel like you could lost memory.
Then put few backups hidden very very carefully and maybe tell one or more of your very trusted close mates where it can be found. It mitigates the risk of loosing the path to recovery if amnesia gets you.
Multiply the number of USB devices as much as you think it's safe to do and hide thoses at different places or close to people that could get it for you.
If you really want to go deeper, protect those in water/fire-proofs containers and why not having few empty keys in advance. Like that you could make that setup over again on other devices in case it is needed one day.
You can add whatever other stuff suits you on the persistant storage. Up to you from there.
I think that it is a pretty decent opsec.
And of course having decoys keys with empty wallets + decoys passwords is a very necessary add-on imo.
The most important thing is trying to keep as much plausible deniability as possible which means having fake but "real looking" decoys ready to be given to persecutors if it has to happen.
Am I missing stuff here ?
Pretty new to all of that but feeling more and more interested.
- BelenaEtcher
- Bitwarden (to store all your passwords locally)
- DBAN
- Ventoy
- Veracrypt
- ISO Tails OS
- ISO Ubuntu/Kali/what you want
- Softwares of your wallets
- Your PGP key + Revocation certificat
Put an omega strong password on top of that.
Remember it is the best way not to leave any hints, exercice yourself to remember it every two days, or more depending on your own confidence.
If you feel like you could lost memory.
Then put few backups hidden very very carefully and maybe tell one or more of your very trusted close mates where it can be found. It mitigates the risk of loosing the path to recovery if amnesia gets you.
Multiply the number of USB devices as much as you think it's safe to do and hide thoses at different places or close to people that could get it for you.
If you really want to go deeper, protect those in water/fire-proofs containers and why not having few empty keys in advance. Like that you could make that setup over again on other devices in case it is needed one day.
You can add whatever other stuff suits you on the persistant storage. Up to you from there.
I think that it is a pretty decent opsec.
And of course having decoys keys with empty wallets + decoys passwords is a very necessary add-on imo.
The most important thing is trying to keep as much plausible deniability as possible which means having fake but "real looking" decoys ready to be given to persecutors if it has to happen.
Am I missing stuff here ?
Pretty new to all of that but feeling more and more interested.