optimum security to me
- Encrypted hard-drive and encrypted backup (of course, don't write the password anywhere. just memorize it)
- Firewall to block 99% of connexion. Just keeping the most useful. When there is a doubt, saving the data into a pcap for further analysis. don't trust anything.
- Double VPN (paid by bitcoin with no log policy) over TOR using a hacked or public Wi-Fi, use an alternative DNS (not google) with a software that has a kill switch (cut all network connection if the vpn is disconnected)
- Change Wi-Fi hotspot often (use a Ya-Gi antenna if necessary)
- Use open source software if you can (and actually check the source if you have time)
- Update all your applications often
- No flash, no java
- don't open any files from an untrusted source
- Use firefox, no history, disable all plugins, spoof user-agent, use noscript, ghostery, adblock edge and https everywhere
- Create a mail account on protonmail.com (mailbox encrypted, end-to-end encryption between user). No gmail, no yahoo, no live.
- Never use the same password twice
- Remove all unnecessary cookies after navigation
- Save "dangerous" files on a RAM disk. To be sure that there is no writing on the harddrive
- Shutdown your computer entirely at night (even laptop), to avoid cold boot attacks
- Keep you up-to-date on hacking attacks and exploit
I may be overly paranoid thou. But I think this is 99.999% safe.
Worst case scenario :
Untrusted VPN and fake TOR exit. If the TOR exit node is corrupted, they can reach your VPN. The thing is that the VPN use the same exit node for everyone. This is why using double VPN is interesting, if some authorities ask your VPN to track your back, they will only be able to track the first VPN, which is shared by many. BUT, if they have a warrant against you, they can start monitoring data in real time and then found&Post too long. Click here to view the full text.