[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Running tor in VPS - keep away snooping eyes



On Wed, Jul 2, 2014 at 7:46 AM, Kali Tor <kalitor42@xxxxxxxxx> wrote:
> I have done all that, so covered on that aspect. Was wondering if disk encryption and use of something like TRESOR would be useful?

The private keys for the node are sensitive, and even the
.tor/state file for the guard nodes could be if the attacker
does not already have that info, same for any non default
node selection stuff in torrc. Tor presumably validates
the disk consensus files against its static keys on startup
so that's probably ok yet all easily under .tor anyway.

There was a thread on this some time ago you can find.
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays