[tor-relays] Running tor in VPS - keep away snooping eyes
s7r at sky-ip.org
Thu Jul 3 11:29:34 UTC 2014
-----BEGIN PGP SIGNED MESSAGE-----
On 7/3/2014 2:18 PM, Kali Tor wrote:
>>> If disk encryption is indeed the way to go, how many of the
>>> node operators do actually encrypt the disk? Has there been
>>> any performance issues? I ask specifically because I run in a
>>> VPS where resources are limited (compared to a proper
>>> - kali-
>> Depends, what configuration will that virtual machine have? You
>> shouldn't notice too big of a difference, full disk encryption
>> is not a resource killer on any configuration.
>> - -- s7r
> 1GB RAM, 1CPU Core, 20GB SSD. Currently being used just for Tor.
> _______________________________________________ tor-relays mailing
> list tor-relays at lists.torproject.org
Yeah, as i thought you won't notice any penalty over performance if
you enable full disk encryption, just keep in mind you have to be
around and enter the passphrase at each and every reboot otherwise the
operating system will not boot.
And on a virtual machine, full disk encryption will not protect you
against physical access to the host machine while the VM is running,
keep that in mind (the decryption key is stored in the RAM memory
otherwise the machine cannot run, they can pause, capture files,
resume or unlimited of other things to break your encryption).
PGP Fingerprint: 7C36 9232 5ABD FB0B 3021 03F1 837F A52C 8126 5B11
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (MingW32)
-----END PGP SIGNATURE-----
More information about the tor-relays