Important Security Note

This guide helps create an ephemeral computing environment. Don't assume anything is anonymous or private. Always practice good operational security.

Current Recommended Approach

Step 1: Get a Laptop/Desktop

  • Visually inspect the machine for tampering or obvious modifications
  • Remove the hard drive
  • Remove WiFi card, if possible
  • Configure BIOS to boot from USB only
  • Configure BIOS to disable bluetooth, NFC, infrared, if they exist

Step 2: Boot from Live USB Drive

  • When booted, plug in ethernet cable
  • Do not connect to wireless networks
  • Use a wired connection only

Step 3: Maintain Ephemeral State

Everything is now ephemeral. The Live USB ensures no data persists on the computer. When you shut down, all activity is wiped.

Recommended Live Operating Systems

Tails

The Amnesic Incognito Live System - a complete operating system designed to be used from a USB stick independently of the computer's original operating system.

Learn More

Ubuntu Live

A popular Linux distribution that can be run as a Live USB. Good general-purpose option with extensive hardware support.

Whonix

Designed for advanced security and privacy. Routes all connections through Tor for anonymity.

Need Help Setting Up?

If you need assistance creating a safe computing environment or have questions about these procedures, please reach out to us.

Contact Us