How To Use TrueCrypt to Encrypt Your Hard Drive Using Ubuntu

  • Post author:
  • Post category:SecurityTutorials
  • Reading time:5 mins read

Why would somebody want to encrypt files on their hard drive, especially if there is nothing to hide? Privacy is one of the fundamental rights that people are, or should be, entitled to. Just because you have no incriminating files, or ground breaking research stored on your computer, does that give others the right to paw through it? Of course not.

Your private material should remain private – not because you have something that you need to keep away from prying eyes, the majority of us don’t, but because privacy is a basic right that is slowly being eroded by those who claim to be for us.

(more…)

Continue ReadingHow To Use TrueCrypt to Encrypt Your Hard Drive Using Ubuntu

Leakage and Contamination: Stay Secure Online

  • Post author:
  • Post category:Security
  • Reading time:3 mins read

What you need to be concerned with are “contamination” and “leakage”. Those two terms are definitely something to keep in mind in your quest for anonymity.

It’s simple: everything you do online can be traced back to you in some way if you do not take precautionary measures to avoid being discovered. Since we’re talking about anonymity, let’s start with the first thing you use to get online — your computer.

If anonymity is important to you, it’s probably best to avoid buying your computer using PayPal or or your credit card. Cash is always the best way. Of course, Bitcoin has its place, but using Bitcoin to buy a computer online doesn’t change the fact that you will need an address to ship it to. Your best bet is to simply pay cash in store.

The best (and safest) way to keep your identity private is to not give out any information at all. If there is nothing on your computer that can be linked to you, then you have considerably less to worry about. Invest in a specific computer that you will use online, encrypt your hard drive (and create a hidden volume), and only use it for what it was intended for.

(more…)

Continue ReadingLeakage and Contamination: Stay Secure Online