Il 03/02/2010 13:59, [email protected] ha scritto: > 1. The article talks about encrypting sensitive information on a > Tor server. Does the author mean that files on hard disk are > obtainable by other Tor users when I run a Tor relay?
No, unless a new vulnerability is discovered in Tor. > 2. I noticed there are key files found on machines running as Tor > relays. An attacker that got your relay's key files after a compromise could impersonate it in the Tor network. This is why it's advisable encrypting a relay's drive. Jan *********************************************************************** To unsubscribe, send an e-mail to [email protected] with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/

