Hidden service: Is it possible for an attacker to break out of a VM?
Robert Ransom
rransom.8774 at gmail.com
Fri Oct 8 00:45:41 UTC 2010
On Thu, 7 Oct 2010 18:12:45 -0400
hikki at Safe-mail.net wrote:
> Several people recommend running a hidden service from within a VM,
> to prevent attackers from doing side channel attacks and reading off your
> hardware components and serial numbers.
Using a VM doesn't prevent most side-channel attacks. It only blocks
access to a description of your hardware.
> Then I heard that attackers can actually break out of VM's if they get root
> access on it due to a successful attack.
It depends on the VM software you are using.
Robert Ransom
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 198 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20101007/4f3aba5a/attachment.pgp>
More information about the tor-talk
mailing list