If the tor process is going to use the
key, at some point the unencrypted key has to be visible to the
machine running it. You would in any case have to trust the
machine hosting the tor node. A more secure setup would be to run
the tor node inside an encrypted VM and use your
smartcard/dongle/whatever to unlock the VM.
On 10/17/2015 12:00 PM, Razvan Dragomirescu wrote:
|
_______________________________________________ tor-dev mailing list tor-dev@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev