TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

PrivateCore demonstrates industry's first PRISM-proof Tor server in public cloud

30 点作者 tjaerv超过 11 年前

6 条评论

dguido超过 11 年前
Press release with no real info. Not sure how a "PRISM-proof Tor server" even makes sense. People you don't like can still run as many backdoored exit nodes as they want, and it's up to you to properly use crypto so they can't sniff your connection. Tor nodes are supposed to be (assumed to be?) untrustworthy.
评论 #6611511 未加载
hershel超过 11 年前
So basically it&#x27;s a VM&#x2F;hypervisor that creates a random key that is stored on the cache or on cpu registers, and uses it to encrypt memory content. similar to tresor[1].<p>Seem like something that can be usefull for android devices, since the main vulnerability of android devices is the ability if chips(like the modem) that have closed source firmware , to access the ram.<p>[1]<a href="http://en.wikipedia.org/wiki/TRESOR#Potential_vulnerabilities" rel="nofollow">http:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;TRESOR#Potential_vulnerabilitie...</a>
eximius超过 11 年前
This is ridiculous. Encrypting memory does not make Tor &quot;PRISM-proof&quot;. The claim is that the NSA just grabs the keys from all of the Tor relays, which is ridiculous and not at all how the NSA has been publicized to do their tracking.
tedks超过 11 年前
This has nothing to do with PRISM, but it&#x27;s still neat technology.<p>&gt; Using PrivateCore vCage, no trace of Tor server code or data is maintained in memory or on disk, eliminating the possible exposure of secret key material through memory forensics.<p>This isn&#x27;t at all what the NSA&#x27;s attacks on Tor are, but uh, good for them, I suppose.
评论 #6611143 未加载
ds9超过 11 年前
Where&#x27;s the source?<p>Open source doesn&#x27;t automatically guarantee anything, but you can&#x27;t have real security without it.
评论 #6611727 未加载
cryptolect超过 11 年前
Does this just boil down to encrypted shared memory on a VPS, on TOR, as-a-service?