Would there a be a significant security/privacy advantage to running a .onion site in a VM that lives entirely on a ramdisk?
The downside obviously would be that anything not backed up would be lost in the case of a reboot.
To me the upside is that it would be very difficult to see anything that had been running in the VM if it needs to be dumped in the event of an emergency. I've heard of techniques that can get bits of data from ram that has been turned off, but I don't think that's easy/inexpensive to do.
What do you think, group?
Would there a be a significant security/privacy advantage to running a .onion site in a VM that lives entirely on a ramdisk?
RAMdisk means in RAM not on media. That devolves to cold boot, or even FDE, attacks, both of which are relatively harder or complicated or short time window than plaintext disk. Or process and general memory space and I/O capture in real time by VM parent, hypervisor, etc.
If you can't trust the VM parent, which you probably can't, the answer might be no, or yes, depending on the range of capability estimate you assign to them.
dumped in the event of an emergency
Some OS have knobs to turn off all swap, dump, pagefiles, etc that otherwise go to media by default.
Your questions are far too generic so no one can really help you.
Sit down and chart out your own datasets, risks, threats, backups, etc. Punch your questions into any search engine. Learn OS admin as needed. Etc.
tor-onions@lists.torproject.org