-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On 17/10/12 11:02, Jerzy Łogiewa wrote: > Hello! > > I just watching this: > http://torrentfreak.com/pirate-bay-moves-to-the-cloud-becomes-raid-proof-121017/ > > This seems like a good strategy for hidden service. Maybe it is OT > a little, but how can I have encrypted VM for my hidden service > where boot password is securely typed? Some cloud service gives > virtual console where I can type boot password on some encrypted > volume, but I think this could be logged. > > Does anyone know the best way to do it?
The problem with using VMs is that the physical host it is running on can silently read the VMs entire memory, allowing it to easily read the VMs disk encryption keys at any point after the VM has booted up. - -- Mike Cardwell https://grepular.com/ http://cardwellit.com/ OpenPGP Key 35BC AF1D 3AA2 1F84 3DC3 B0CF 70A5 F512 0018 461F XMPP OTR Key 8924 B06A 7917 AAF3 DBB1 BF1B 295C 3C78 3EF1 46B4 -----BEGIN PGP SIGNATURE----- iQGGBAEBCgBwBQJQfoXZMBSAAAAAACAAB3ByZWZlcnJlZC1lbWFpbC1lbmNvZGlu Z0BwZ3AuY29tcGdwbWltZTgUgAAAAAAVABpwa2EtYWRkcmVzc0BnbnVwZy5vcmdt aWtlLmNhcmR3ZWxsQGdyZXB1bGFyLmNvbQAKCRCdJiMBwdHnBPSVCAC3vL+zB4Tj z5zc93hhIKRoKU4R2CdqbGK1bjAtiHGlCeQvJnYcajfr0FwmKLLUwxGbbHFbPFyt lsL/ZIQ/j52f0MJhCv7lpapCYcv5suj6HXNhSv32f7Bjynv/1LCHkdt0hekjW0uS jmfUuIJZB41YGGpIgsShdhR1wdW6M5CwS8UK/2URUyJj+mBn8M7IvpsnMMdqJU97 THj2ocCqLsxTAmP5ATN1ZdzIwlf8ZQrmOFI/qtHsEJ8VKHtoL5NXw+kR8xjhXqvj 2niE2yNDI0E9bxZKUcwysROxHWixmZqEiPS6i6I0BsGP24SNFhY7TYtGlG3FhZiY yzzTFfibiKVn =2u/P -----END PGP SIGNATURE----- _______________________________________________ tor-talk mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
