Running DOPUS from USB key - security concerns?

My apologies if this question was asked somewhere...searched the forums and didn't find a pertinent topic.

I'm have DOPUS 13 on a USB key. I carry this key on my keychain along with my physical keys. This made me wonder if there is any personal identifying information that my DOPUS install could reveal that could give a nefarious finder of my lost keys knowledge of where I live, my cars, etc. Some questions:

  1. Assuming a default/vanilla installation of a registered copy of DOPUS, is there any known locations of personal identifiable information? (i.e. the email address DOPUS is registered with or other license-related info, cached files themselves or file/folder history accessed via the USB key from the computer I'm running it on, etc.)

  2. I have some scripts assigned to toolbar buttons that use NET USE command in Windows and included the pw of my network shares. If I wanted to remove these from the USB copy of DOPUS, besides deleting the buttons, what would I need to delete so that info is not recoverable?

  3. I'm currently running DOPUS off a Veracrypt partition on the USB key. Is there any personally identifiable information on the host USB drive partition (see (1) above)?

  4. Veracrypt is an additional hassle I'd prefer to avoid. Should I be concerned if I don't? I don't really want basically "label" my physical keys with digitally-discoverable "directions" to my home and vehicles. :slight_smile:

Thanks so much for any help you can offer.

  1. Your email address will be in Help > Licence Manager.

  2. You could move the commands into .bat files (or similar) that are only stored on the main machine, and change the toolbars to run those instead of running the commands directly.

  3. If Opus is run directly from the USB stick, it shouldn't result in anything being left on the host machine's main drive. (Other than in the Windows swap file, potentially, and the temp dir may contain temporary .bat files for certain types of commands that need them and were run recently and not yet cleaned up.)

  4. Depends what else is on the stick, but it isn't necessary just for Opus unless you have something sensitive in your config. (FTP passwords is the other thing to be aware of, if you store those in your config.)

Thanks for the information. One clarification:

I'm actually wondering about what might be present on the USB stick itself, including after such interactions with a host (sorry, I used the word "host" incorrectly in my question).

Thanks!

The USB stick will store your Opus configuration, which may also include logs of actions performed (if those are turned on).

Do you mean on the stick but outside the container? Not a single file, at least on my sticks. Just the license info, tugged away in the stick's innards.

Hi, lxp. Thanks for the help! So basically, wondering what personal info might be left behind that could tie my USB stick to my identity (and therefore my physical keys) in the following two scenarios:

  1. Running DOPUS 13 from Veracrypt drive (what would be left on the non-encrypted part of the USB drive)

or

  1. Running DOPUS 13 on USB stick (w/o Veracrypt)

Thanks!