Preprogrammed disposable cell phone dating service
(The ultra-paranoid way to do this is to buy two identical computers, configure one using the above method, upload the results to a cloud-based anti-virus checker, and transfer the results of that to the air gap machine using a one-way process.) 2.
You can configure Tails with a persistent volume to save your data, but no operating system changes are ever saved.Booting Tails from a read-only DVD -- you can keep your data on an encrypted USB stick -- is even more secure.Of course, this is not foolproof, but it greatly reduces the potential avenues for attack. And it's probably impossible to enforce for any network more complicated than a single computer with a single user. I am also ignoring black bag attacks against my home.It's impossible to completely avoid connecting the computer to the Internet, but try to configure it all at once and as anonymously as possible.I purchased my computer off-the-shelf in a big box store, then went to a friend's network and downloaded everything I needed in a single session.The less software you install, the less an attacker has available to exploit.
I downloaded and installed Open Office, a PDF reader, a text editor, True Crypt, and Bleach Bit. (No, I don't have any inside knowledge about True Crypt, and there's a lot about it that makes me suspicious.
Since I started working with Snowden's documents, I have been using a number of tools to try to stay secure from the NSA.
The advice I shared included using Tor, preferring certain cryptography over others, and using public-domain encryption wherever possible.
You can also verify how much data has been written to the CD by physically checking the back of it.
If you've only written one file, but it looks like three-quarters of the CD was burned, you have a problem.
So if you use a tiny transfer device, it can only steal a very small amount of data at a time.