[tor-relays] tor relay - vps maintenance - what to do ?

William Kane ttallink at googlemail.com
Tue Jul 21 16:54:07 UTC 2020


Depends on your disk encryption software - VeraCrypt on Windows
supports encrypting sensitive data (including keys) in RAM.

2020-07-13 11:10 GMT, fl4co <fl4co at fl4co.xyz>:
>
>
>> Il giorno 13 lug 2020, alle ore 08:44, Roman Mamedov <rm at romanrm.net> ha
>> scritto:
>>
>> On Sun, 12 Jul 2020 21:12:31 +0000
>> dlugasny at protonmail.com wrote:
>>
>> The only way to protect from that, is to set up Full-disk encryption (FDE)
>> on
>> the VPS beforehand. But even then, it is challenging to make sure the
>> decryption key is not leaked to the provider (e.g. when entering it via
>> their
>> "VNC Console", which can be keylogged).
>>
>> If you do not set up FDE, you should assume all your data on any VPS is
>> accessible to the provider. Even RAM of a VPS can be copied without
>> stopping
>> it, so running Tor in a RAM disk (tmpfs) is not an answer either.
>
> I think that even with full-disk encryption, the decryption key can be
> obtained from RAM. Is that correct?
>
> A VPS is probably not a good choice if privacy is mission critical.
>
>> fl4co
>
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>


More information about the tor-relays mailing list