ge system of the
vserver?
Date: Tue, 27 Aug 2013 00:14:36 -0400
From: t...@t-3.net
To:
Subject: Re: [tor-relays] Store key files in RAM
Message-ID: <521c27ac.570.f998d700.4984...@t-3.net>
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
IMO cut and paste in the
ct: Re: [tor-relays] Store key files in RAM
> Message-ID: <521c27ac.570.f998d700.4984...@t-3.net>
> Content-Type: text/plain; charset="us-ascii"; Format="flowed"
>
> IMO cut and paste in the situation you're describing is not the
> perfect way. Better way wo
IMO cut and paste in the situation you're describing is not the
perfect way. Better way would be:
Have a secure linux machine running an sshd at your home (or another
physically-controlled location?).
Close off iptables and ip6tables for inbound sshd except for your
vserver's IP
(hint: "ssh-ke
Hi,
I have been discovering simple and secure way of protecting the Tor key
files recently, in order to achieve the safety of the keys on VPS.
So I created a folder on Linux called /tor and it is stored in the RAM file
system. I put my key file into that folder and link it back to the data
direct