-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
On 7/3/2014 2:18 PM, Kali Tor wrote:
If disk encryption is indeed the way to go, how many of the node operators do actually encrypt the disk? Has there been any performance issues? I ask specifically because I run in a VPS where resources are limited (compared to a proper machine).
- kali-
Depends, what configuration will that virtual machine have? You shouldn't notice too big of a difference, full disk encryption is not a resource killer on any configuration.
- -- s7r
1GB RAM, 1CPU Core, 20GB SSD. Currently being used just for Tor.
-kali-
_______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Yeah, as i thought you won't notice any penalty over performance if you enable full disk encryption, just keep in mind you have to be around and enter the passphrase at each and every reboot otherwise the operating system will not boot.
And on a virtual machine, full disk encryption will not protect you against physical access to the host machine while the VM is running, keep that in mind (the decryption key is stored in the RAM memory otherwise the machine cannot run, they can pause, capture files, resume or unlimited of other things to break your encryption). - -- s7r PGP Fingerprint: 7C36 9232 5ABD FB0B 3021 03F1 837F A52C 8126 5B11