[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] new relay package for Ubuntu 16.04+



> On 31 Aug 2016, at 15:20, Chad MILLER <chad@xxxxxxxxxxxx> wrote:
> 
> But it can never look in your ~/.gnupg/ dir or grab your scanner or wipe your yubikey or turn on your camera or whatever, as another program, rogue or compromised, could do. None of that even seems to exist.

If it shares physical RAM with other processes or VMs, it can modify their RAM, under certain conditions:

https://www.schneier.com/blog/archives/2016/08/powerful_bit-fl.html

Unfortunately, VMs and similar isolation techniques aren't great at preventing hardware-based side-channels.

But in most cases, for most threat models, yes, it's quite secure.

Tim

Tim Wilson-Brown (teor)

teor2345 at gmail dot com
PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B
ricochet:ekmygaiu4rzgsk6n
xmpp: teor at torproject dot org






Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays