[tor-relays] tor relay - vps maintenance - what to do ?

fl4co fl4co at fl4co.xyz
Mon Jul 13 11:10:20 UTC 2020



> Il giorno 13 lug 2020, alle ore 08:44, Roman Mamedov <rm at romanrm.net> ha scritto:
> 
> On Sun, 12 Jul 2020 21:12:31 +0000
> dlugasny at protonmail.com wrote:
> 
> The only way to protect from that, is to set up Full-disk encryption (FDE) on
> the VPS beforehand. But even then, it is challenging to make sure the
> decryption key is not leaked to the provider (e.g. when entering it via their
> "VNC Console", which can be keylogged).
> 
> If you do not set up FDE, you should assume all your data on any VPS is
> accessible to the provider. Even RAM of a VPS can be copied without stopping
> it, so running Tor in a RAM disk (tmpfs) is not an answer either.

I think that even with full-disk encryption, the decryption key can be obtained from RAM. Is that correct?

A VPS is probably not a good choice if privacy is mission critical.

—
fl4co



More information about the tor-relays mailing list