ThePhantomToker
New member
For various reasons I like to remain anonymous on these forums. I also like to keep any traces of this site off my computer. In the interest of sharing I will describe my methods. Please keep in mind that I am no expert. If anyone notes a chink in my armor, please let me know. The programs and methods I use are as follows:
I have a 2gig USB pen drive set up with truecrypt traveler mode and a truecrypt volume. Inside that volume I have a tunneling proxy type program called Gpass and Firefox Portable with a couple of other programs.
Basically I mount the truecrypt volume from the pen drive, then start Gpass and run Firefox Portable from Gpass, and then surf as I normally would. When I'm done surfing I.C. Mag, for instance, I close Firefox Portable, close Gpass, dismount my truecrypt volume, stop my pen drive (safely eject), remove the pen drive from the USB port and I'm done.
The only trace of my activity left is a registry entry noting that I opened a truecrypt volume. As far as the pen drive goes it has the truecrypt traveler setup, and the encrypted volume. Given the strength of my password for that volume I'll be long gone before LEO could brute force it.
I also use a program called Ccleaner on my machine that cleans the hard drive of all kinds of files, as well as, cleaning the registry( oops there goes that truecrypt reg entry). The second program I use is called Eraser and it basically erases files and empty hard drive space by overwriting at an irretrievable level.
I'm not going to get into how to set this up as the folks at the respected software websites have all ready done a great job of this, but I will tell you that if you google the following you be well on your way:
Truecrypt
Gpass
Firefox Portable
Ccleaner
Eraser
Running firefox from a usb drive
Running Truecrypt from a usb drive
Peace TPT
I have a 2gig USB pen drive set up with truecrypt traveler mode and a truecrypt volume. Inside that volume I have a tunneling proxy type program called Gpass and Firefox Portable with a couple of other programs.
Basically I mount the truecrypt volume from the pen drive, then start Gpass and run Firefox Portable from Gpass, and then surf as I normally would. When I'm done surfing I.C. Mag, for instance, I close Firefox Portable, close Gpass, dismount my truecrypt volume, stop my pen drive (safely eject), remove the pen drive from the USB port and I'm done.
The only trace of my activity left is a registry entry noting that I opened a truecrypt volume. As far as the pen drive goes it has the truecrypt traveler setup, and the encrypted volume. Given the strength of my password for that volume I'll be long gone before LEO could brute force it.
I also use a program called Ccleaner on my machine that cleans the hard drive of all kinds of files, as well as, cleaning the registry( oops there goes that truecrypt reg entry). The second program I use is called Eraser and it basically erases files and empty hard drive space by overwriting at an irretrievable level.
I'm not going to get into how to set this up as the folks at the respected software websites have all ready done a great job of this, but I will tell you that if you google the following you be well on your way:
Truecrypt
Gpass
Firefox Portable
Ccleaner
Eraser
Running firefox from a usb drive
Running Truecrypt from a usb drive
Peace TPT