-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 7/3/2014 2:18 PM, Kali Tor wrote:
>
>
>>> If disk encryption is indeed the way to go, how many of the
>>> node operators do actually encrypt the disk? Has there been
>>> any performance issues? I ask specifically because I run in a
>>> VPS where r
>> If disk encryption is indeed the way to go, how many of the node
>> operators do actually encrypt the disk? Has there been any
>> performance issues? I ask specifically because I run in a VPS where
>> resources are limited (compared to a proper machine).
>>
>> - kali-
>
> Depends, what
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 7/3/2014 1:40 PM, Kali Tor wrote:
>
>
>
>
>
>> On Thursday, July 3, 2014 9:11 AM, Mike Cardwell
>> wrote:
>>> * on the Thu, Jul 03, 2014 at 10:02:06AM +0200, Lunar wrote:
>>
> I have done all that, so covered on that aspect. Was
> won
> On Thursday, July 3, 2014 9:11 AM, Mike Cardwell
> wrote:
> > * on the Thu, Jul 03, 2014 at 10:02:06AM +0200, Lunar wrote:
>
I have done all that, so covered on that aspect. Was wondering if
> disk encryption and use of something like TRESOR would be useful?
>>>
>>> The private k
* on the Thu, Jul 03, 2014 at 10:02:06AM +0200, Lunar wrote:
>>> I have done all that, so covered on that aspect. Was wondering if disk
>>> encryption and use of something like TRESOR would be useful?
>>
>> The private keys for the node are sensitive, and even the
>> .tor/state file for the guar
grarpamp:
> On Wed, Jul 2, 2014 at 7:46 AM, Kali Tor wrote:
> > I have done all that, so covered on that aspect. Was wondering if disk
> > encryption and use of something like TRESOR would be useful?
>
> The private keys for the node are sensitive, and even the
> .tor/state file for the guard no
On Wed, Jul 2, 2014 at 7:46 AM, Kali Tor wrote:
> I have done all that, so covered on that aspect. Was wondering if disk
> encryption and use of something like TRESOR would be useful?
The private keys for the node are sensitive, and even the
.tor/state file for the guard nodes could be if the at
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 7/2/2014 2:46 PM, Kali Tor wrote:
> Hi,
>
>
>>
>> If you are asking how to secure your box better, indeed the
>> public IP address list of relays is often scanned and brute
>> forced. That is why I recommend:
>>
>> - - if you run only Tor on th
Hi,
>
> If you are asking how to secureĀ your box better, indeed the public IP
> address list of relays is often scanned and brute forced. That is why
> I recommend:
>
> - - if you run only Tor on that box is best, if not make sure your apps
> are properly secured (mysql not listening on public
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 7/2/2014 9:50 AM, Kali Tor wrote:
> All,
>
> Are there anything special that needs to be done to make sure that
> Tor nodes running inside VMs (VPS) is protected from snooping eyes?
> Since there is hardly any data at rest I am assuming not, but th
All,
Are there anything special that needs to be done to make sure that Tor nodes
running inside VMs (VPS) is protected from snooping eyes? Since there is hardly
any data at rest I am assuming not, but then, what do I know!:)
-kali-
___
tor-relays ma
11 matches
Mail list logo