> On 25 Oct. 2016, at 21:03, Duncan Guthrie <[email protected]> wrote: > > Hi folks, > > I am not sure it is more secure. What are we trying to protect here? As long > as the relay is running,it is unencrypted. Disk encryption only prevents > physical access - are you at risk of this? At any rate, the relay shouldn't > be storing personal data. > > Having it encrypted also makes remote management an absolute pain. > > Can someone clarify this?
I am not a lawyer, but I've heard that it helps to prove you have no personal data. This is harder when there is encrypted data on the machine. Tim > -- D > > On 24 October 2016 08:53:14 BST, Petrusko <[email protected]> wrote: > Hey all, > > I'm planning to customise a RPi with Raspbian already running, and using > cryptsetup (LUKS) to have a partition more secure for some reasons... > So the goal is to move some existing sensitive folders to this new > encrypted partition. > Some sym-links will be used for those directories. > > About Tor, if I'm not wrong, those directories can be moved to this > encrypted partition : > /var/lib/tor : so I'm planning to move /var... > > So at final, planning to move : > /home > /var > /tmp > (why not swap file ?) > > Any suggestions and master's thoughts are welcome :) > _______________________________________________ > tor-relays mailing list > [email protected] > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays T -- Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B ricochet:ekmygaiu4rzgsk6n xmpp: teor at torproject dot org ------------------------------------------------------------------------------ _______________________________________________ tor-relays mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
