Best Practice for Creating and Accessing an Encrypted Database with a Strong Threat Model

Goal:
I’m seeking feedback on the most secure setup for creating and accessing an encrypted database (KDBX4 format) that minimizes exposure to potential remote attacks. This database will contain highly sensitive information, and my primar… Continue reading Best Practice for Creating and Accessing an Encrypted Database with a Strong Threat Model

How to encrypt a disk with 2 Windows OSes and 3 partitions with Vera Crypt? [migrated]

I have a disk with an MBR partition scheme and 3 partitions. On the first partition, there’s a Windows 7 C: drive which I keep to play some retro games that won’t run on newer Windows. The second partition is a Windows 7 D: partition. It’s… Continue reading How to encrypt a disk with 2 Windows OSes and 3 partitions with Vera Crypt? [migrated]

GPU vs integrated graphics hardware, browser canvas fingerprinting, and multi- or dual-boot systems

My goal is to ensure that two operating systems installed side-by-side on the same device are unable to return the same canvas fingerprint, when a modern browser is allowed to run javascript without any anti-fingerprint restrictions in pla… Continue reading GPU vs integrated graphics hardware, browser canvas fingerprinting, and multi- or dual-boot systems