Tor relay security
Jan Reister
Jan.Reister at unimi.it
Wed Feb 3 14:10:19 UTC 2010
Il 03/02/2010 13:59, onion.soup at nym.hush.com ha scritto:
> 1. The article talks about encrypting sensitive information on a
> Tor server. Does the author mean that files on hard disk are
> obtainable by other Tor users when I run a Tor relay?
No, unless a new vulnerability is discovered in Tor.
> 2. I noticed there are key files found on machines running as Tor
> relays.
An attacker that got your relay's key files after a compromise could
impersonate it in the Tor network. This is why it's advisable encrypting
a relay's drive.
Jan
***********************************************************************
To unsubscribe, send an e-mail to majordomo at torproject.org with
unsubscribe or-talk in the body. http://archives.seul.org/or/talk/
More information about the tor-talk
mailing list