[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Is it safe to run an exit node from a VPS provider?





On 08/13/2013 11:10 AM, Sindhudweep Sarkar wrote:
Apologies if the reply goes to the wrong location in the thread.

"... At least with Xen/KVM/VMware you're running on your own virtual disk..."


Can't the virtual disk just be mounted by whoever has access? I don't think this is a large barrier to entry for anyone or a script looking for private keys. I could argue that pretty much every mac user has been getting software in the form of disk images, and these possibly non-technical users seem to have no issues.

Well, any VM host can mount and read an unencrypted disk image.

I guess the difference is ease of snooping. While access to disk contents and process info can be gotten by any hypervisor, some platforms make it easier than others.

Again, though: running an exit node in a VM is better than not running an exit node at all.
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays