Depends on your disk encryption software - VeraCrypt on Windows supports encrypting sensitive data (including keys) in RAM.
2020-07-13 11:10 GMT, fl4co fl4co@fl4co.xyz:
Il giorno 13 lug 2020, alle ore 08:44, Roman Mamedov rm@romanrm.net ha scritto:
On Sun, 12 Jul 2020 21:12:31 +0000 dlugasny@protonmail.com wrote:
The only way to protect from that, is to set up Full-disk encryption (FDE) on the VPS beforehand. But even then, it is challenging to make sure the decryption key is not leaked to the provider (e.g. when entering it via their "VNC Console", which can be keylogged).
If you do not set up FDE, you should assume all your data on any VPS is accessible to the provider. Even RAM of a VPS can be copied without stopping it, so running Tor in a RAM disk (tmpfs) is not an answer either.
I think that even with full-disk encryption, the decryption key can be obtained from RAM. Is that correct?
A VPS is probably not a good choice if privacy is mission critical.
— fl4co
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays