Create a SAFE TOR Hidden Service in a VM (Re: Please Help Me Test my Hidden Service Pt. 2)

Ringo 2600denver at gmail.com
Wed Feb 24 05:10:07 UTC 2010


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

One update that should be noted is that this doesn't protect against
"bad nanny" attacks. With full disk encryption, the boot partition isn't
encrypted (as you have to load it so it can ask for your passphrase and
decrypt the rest of the drive). If the machine isn't physically secured,
it's vulnerable to this type of attack.

Solidarity,
Ringo

7v5w7go9ub0o wrote:
> Good job!
> 
> IMHO this is a very nice paper; well written!
> 
> (Adjusted the title of this post a bit, in case the readers weren't
> aware your goal ....)
> 
> (FWIW, some might want to read the paper - to gain a lot of insight and
> background - and then download/test a copy of your (sanitized) .img
> file. First running of the VM would be -with- saving of any changes to
> the VM so as to create and save a unique, permanent service name;
> subsequent runs discard changes!?)
> 
> ***********************************************************************
> To unsubscribe, send an e-mail to majordomo at torproject.org with
> unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/
> 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkuEtK8ACgkQETpif9i/srq2lwCfZfhJCegkIYZcCkaQMMmXqIq4
aogAn1P1WK/BooxiS7hC44gRAmp4RVxb
=AAH9
-----END PGP SIGNATURE-----
***********************************************************************
To unsubscribe, send an e-mail to majordomo at torproject.org with
unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/



More information about the tor-talk mailing list