Hidden service: Is it possible for an attacker to break out of a VM?

Robert Ransom rransom.8774 at gmail.com
Fri Oct 8 00:45:41 UTC 2010


On Thu, 7 Oct 2010 18:12:45 -0400
hikki at Safe-mail.net wrote:

> Several people recommend running a hidden service from within a VM, 
> to prevent attackers from doing side channel attacks and reading off your 
> hardware components and serial numbers.

Using a VM doesn't prevent most side-channel attacks.  It only blocks
access to a description of your hardware.

> Then I heard that attackers can actually break out of VM's if they get root 
> access on it due to a successful attack.

It depends on the VM software you are using.


Robert Ransom
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 198 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20101007/4f3aba5a/attachment.pgp>


More information about the tor-talk mailing list