As far as I know, there are ways to detect some kinds of access, but I'm pretty sure there are exceptions. Pedantically, I'm not even sure it's possible: * to detect all memory snapshots on some physical hardware configurations. * to detect whether you're running on a VM/VPS or dedicated machine (but most hypervisors will tell you). However, it's worth noting that the Tor network security model relies on semi-trusted directory authorities and untrusted relays. Occasional compromises can be tolerated while maintaining overall network security (of course, some specific users of those relays may have some specific activity disclosed, particularly if information from multiple sources is combined).
I don't know enough to answer this. Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B teor at blah dot im OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F |
Attachment:
signature.asc
Description: Message signed with OpenPGP using GPGMail
_______________________________________________ tor-relays mailing list tor-relays@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays