what are the best lap-top for opsec?

41Dxflatline

Don't buy from me
Resident
Joined
Dec 23, 2022
Messages
320
Solutions
1
Reaction score
157
Points
43
The best laptop for opsec is SSH/VNC into a raspberrypi running tails disguised as a junction box up high on the side of your house.
 

freedum

Buying through escrow
New seller
Language
🇬🇧
Joined
Nov 4, 2023
Messages
64
Reaction score
48
Points
18
Deals
1
Tails only
Read the dnm Bible. It's very basic but has a few points to get started.
 

V€ctor Company

Don't buy from me
Resident
Language
🇺🇸
Joined
Oct 19, 2023
Messages
25
Reaction score
7
Points
3
It honestly does not matter what laptop you can get as long as it can run tails or any other encrypted operating system such as whonix, qubes etc.

Chromebooks can run tails and as another user said, they are fucking cheap and you can chuck them away if you need to but of you use tails or run any other encrypted operating system off a USB stick, you can just throw the hard drive away as there is not a trace on your computer anyway.
 

zeus

Don't buy from me
Member
Joined
Sep 21, 2022
Messages
4
Reaction score
2
Points
3
The specific model of laptop is irelevant. I will not use one from Apple or Microsoft though.

Here is some security advice.
  • Always reinstall the OS after you bought the laptop.
  • Use Whonix in Virtualbox, inside a VeraCrypt container.
  • Route all Whonix trafic trough Tor.
  • Use a strong VPN in main OS, so you ISP would not see that you use Tor.
  • Encrypt the main storage and use a resonable secure password for OS.
  • ALWAYS close the veracrypt drive when the work is done.
  • Never store darknet files outside of an encryppted veracrypt container.
  • Read the books recomended here about opsec.
 

thecurious

Don't buy from me
Member
Joined
Jan 29, 2024
Messages
6
Reaction score
9
Points
3
When I look at the reasons why people have been imprisoned in the last 5 years, they are as follows:

- Used dirty cryptocurrency to pay for pizza (admin of Wallstreet-Market, Chemical-Revolution "joko7/sicario")
- Used an email address that had a connection to the real world (Silkroad/DPR)
- Lack of encryption
- Betrayal by former partners and supposed friends


I have experienced and had to experience through law enforcement that TrueCrypt was bulletproof at the time and VeraCrypt is bulletproof now.

My investigation was recently concluded, the confiscated (and encrypted) hardware was not handed over, but nothing could be found.

My personal recommendation (depending on local laws) apart from all the frantic calls for Linux and co:
- Only use the laptop with a power cable (remove the battery)
- Install the latest version of VeraCrypt
- Never use dirty money that you earn in any other way for consumption, i.e. for food, drink, etc. Convert it into cash first, don't use Monero either - only money is absolutely anonymous.
 
Top