diff --git a/opsec/index.html b/opsec/index.html index ad4a5ba..6092b49 100644 --- a/opsec/index.html +++ b/opsec/index.html @@ -288,10 +288,10 @@

💻 Clientside - Getting Started

  1. ✅ Using the Host-OS in live-mode to enable Sensitive Use
  2. +
  3. ✅ Tails OS for Temporary Sensitive Use
  4. ✅ The main source of Plausible Deniability: Deniable Encryption
  5. ✅ Sensitive use VMs Setup (Whonix VMs in a Veracrypt Hidden Volume)⭐
  6. 🟠 Plausibly Deniable Critical Data Backups
  7. -
  8. ✅ Tails OS QEMU VM for Temporary Sensitive Use

💻 Steganography - Hiding secrets in plain sight

    diff --git a/opsec/tailsqemuvm/index.html b/opsec/tailsqemuvm/index.html index 69a1390..f82894b 100644 --- a/opsec/tailsqemuvm/index.html +++ b/opsec/tailsqemuvm/index.html @@ -8,7 +8,7 @@ - Tails OS QEMU VM for Temporary Sensitive Use + Tails OS for Temporary Sensitive Use @@ -61,12 +61,13 @@
    Previous Page

    nihilist@mainpc - 2024-10-03

    -

    Tails OS QEMU VM for Temporary Sensitive Use

    +

    Tails OS for Temporary Sensitive Use

    In this tutorial we're going to look at how you can run Tails OS (The Amnesic Incognito Linux System) on a USB Stick, and also on a QEMU VM, following the official documentation here.

    Tails OS is suitable for Short Term Sensitive Use due to it's default live-mode feature, where upon shutting down the OS, every forensic trace of what you were doing is completely erased from memory, where the entire OS is loaded into. There are no disk-writes at all by default. (Unless if you use the persistent storage, which is not suitable for sensitive use, due to not being deniable encryption like Veracrypt ).

    +

    While it is similar to Whonix, it is specificially intended for temporary sensitive use. Whonix on the other hand can be used for long-term sensitive use. Click here for more details on the differences between Whonix and Tails.

    OPSEC Recommendations (for the live USB setup):

    1. Hardware : (Personal Computer / Laptop) and a USB stick (with at least 2GB)