Jo: > Hello, is there a way to encrypt an Tailsbootstick? (preferable with luks) > Not that I am aware of.
> So you can hide the fact it is a tailsstick, but still use it "normal" > and in Virtual Maschine Manager (which is the most comfortable way in my > opinion if you use tails on a daily base). > It may be more comfortable but take into consideration that in that case, both the host operating system and the virtualization software are able to monitor what you are doing in Tails. If the host operating system is compromised with a software keylogger or other malware, then it can break the security features of Tails. https://tails.boum.org/doc/advanced_topics/virtualization/ (That said, I guess you could just have your Tails ISO on some encrypted LUKS partition if you are running Linux, and unlock it when needed. But why bother using Tails then?)
signature.asc
Description: OpenPGP digital signature
_______________________________________________ tails-support mailing list [email protected] https://mailman.boum.org/listinfo/tails-support To unsubscribe from this list, send an empty email to [email protected].
