Jo:
> Hello, is there a way to encrypt an Tailsbootstick? (preferable with luks)
> 
Not that I am aware of.

> So you can hide the fact it is a tailsstick, but still use it "normal"
> and in Virtual Maschine Manager (which is the most comfortable way in my
> opinion if you use tails on a daily base).
> 
It may be more comfortable but take into consideration that in that
case, both the host operating system and the virtualization software are
able to monitor what you are doing in Tails.

If the host operating system is compromised with a software keylogger or
other malware, then it can break the security features of Tails.

https://tails.boum.org/doc/advanced_topics/virtualization/

(That said, I guess you could just have your Tails ISO on some encrypted
LUKS partition if you are running Linux, and unlock it when needed. But
why bother using Tails then?)

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
tails-support mailing list
[email protected]
https://mailman.boum.org/listinfo/tails-support
To unsubscribe from this list, send an empty email to 
[email protected].

Reply via email to