[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] List of Relays' Available SSH Auth Methods



This only applies if you're able to rid your hardware of all evidence of ever connecting to your node, and have no record of ownership of that node whatsoever. I find that a fairly unlikely scenario, to be honest.

On 18/11/14 19:10, Dan Rogers wrote:
>
>
> IMO there could occasionally be reasons not to use key logins (although
> I do normally disable pwd login). E.g. if I have a key, I then have
> evidence somewhere (USB/HD), whereas a secure password can be kept only
> in my head (until they waterboard me). Especially in countries (e.g. the
> UK) that can force you to hand over encryption keys. I'd rather have an
> insecure Tor node than get arrested (although tbh with fail2ban
> installed I don't think pwd bruteforcing is a threat).
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays