+1 This. The problem is especially on container-virtualizations like OpenVZ is that the admins of the hostnodes must just type something like 'vzctl enter 123' and they have a shell in your VPS...
So you should have at least Xen/KVM where you can use encryption On 09/25/2012 07:35 PM, SiNA Rabbani wrote: > Also make sure the ISP does not have root login to your VM. > Some ISPs like Gandi install special daemons that can be used to login > to the VM :/ > > I like Amazon EC2 service very much! > > --SiNA > On 09/25/2012 10:33 AM, Moritz Bartl wrote: >> On 25.09.2012 19:31, Webmaster wrote: >>> Can anyone suggest a vps provider that is friendly to tor hidden >>> services. This would not be for an exit node. >> Hidden services should not be a problem for just about any VPS provider. >> Just make sure you stay within the bandwidth limits. >> > _______________________________________________ > tor-talk mailing list > [email protected] > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk _______________________________________________ tor-talk mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
