[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Tor hidden service 'in cloud'



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

On 17/10/12 11:02, Jerzy Åogiewa wrote:
> Hello!
> 
> I just watching this:
> http://torrentfreak.com/pirate-bay-moves-to-the-cloud-becomes-raid-proof-121017/
>
>  This seems like a good strategy for hidden service. Maybe it is OT
> a little, but how can I have encrypted VM for my hidden service
> where boot password is securely typed? Some cloud service gives
> virtual console where I can type boot password on some encrypted
> volume, but I think this could be logged.
> 
> Does anyone know the best way to do it?

The problem with using VMs is that the physical host it is running on
can silently read the VMs entire memory, allowing it to easily read
the VMs disk encryption keys at any point after the VM has booted up.

- -- 
Mike Cardwell  https://grepular.com/     http://cardwellit.com/
OpenPGP Key    35BC AF1D 3AA2 1F84 3DC3  B0CF 70A5 F512 0018 461F
XMPP OTR Key   8924 B06A 7917 AAF3 DBB1  BF1B 295C 3C78 3EF1 46B4
-----BEGIN PGP SIGNATURE-----

iQGGBAEBCgBwBQJQfoXZMBSAAAAAACAAB3ByZWZlcnJlZC1lbWFpbC1lbmNvZGlu
Z0BwZ3AuY29tcGdwbWltZTgUgAAAAAAVABpwa2EtYWRkcmVzc0BnbnVwZy5vcmdt
aWtlLmNhcmR3ZWxsQGdyZXB1bGFyLmNvbQAKCRCdJiMBwdHnBPSVCAC3vL+zB4Tj
z5zc93hhIKRoKU4R2CdqbGK1bjAtiHGlCeQvJnYcajfr0FwmKLLUwxGbbHFbPFyt
lsL/ZIQ/j52f0MJhCv7lpapCYcv5suj6HXNhSv32f7Bjynv/1LCHkdt0hekjW0uS
jmfUuIJZB41YGGpIgsShdhR1wdW6M5CwS8UK/2URUyJj+mBn8M7IvpsnMMdqJU97
THj2ocCqLsxTAmP5ATN1ZdzIwlf8ZQrmOFI/qtHsEJ8VKHtoL5NXw+kR8xjhXqvj
2niE2yNDI0E9bxZKUcwysROxHWixmZqEiPS6i6I0BsGP24SNFhY7TYtGlG3FhZiY
yzzTFfibiKVn
=2u/P
-----END PGP SIGNATURE-----
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk