Tor relay security

Jan Reister Jan.Reister at
Wed Feb 3 14:10:19 UTC 2010

Il 03/02/2010 13:59, onion.soup at ha scritto:
> 1. The article talks about encrypting sensitive information on a 
> Tor server. Does the author mean that files on hard disk are 
> obtainable by other Tor users when I run a Tor relay?

No, unless a new vulnerability is discovered in Tor.

> 2. I noticed there are key files found on machines running as Tor 
> relays. 

An attacker that got your relay's key files after a compromise could
impersonate it in the Tor network. This is why it's advisable encrypting
a relay's drive.

To unsubscribe, send an e-mail to majordomo at with
unsubscribe or-talk    in the body.

More information about the tor-talk mailing list