Depends on your disk encryption software - VeraCrypt on Windows supports encrypting sensitive data (including keys) in RAM.
2020-07-13 11:10 GMT, fl4co <fl...@fl4co.xyz>: > > >> Il giorno 13 lug 2020, alle ore 08:44, Roman Mamedov <r...@romanrm.net> ha >> scritto: >> >> On Sun, 12 Jul 2020 21:12:31 +0000 >> dluga...@protonmail.com wrote: >> >> The only way to protect from that, is to set up Full-disk encryption (FDE) >> on >> the VPS beforehand. But even then, it is challenging to make sure the >> decryption key is not leaked to the provider (e.g. when entering it via >> their >> "VNC Console", which can be keylogged). >> >> If you do not set up FDE, you should assume all your data on any VPS is >> accessible to the provider. Even RAM of a VPS can be copied without >> stopping >> it, so running Tor in a RAM disk (tmpfs) is not an answer either. > > I think that even with full-disk encryption, the decryption key can be > obtained from RAM. Is that correct? > > A VPS is probably not a good choice if privacy is mission critical. > > — > fl4co > > _______________________________________________ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays