Yes, and I would rather have law enforcement find nothing incriminating on my harddisk than being accused of obfuscation or destroying of evidence (this might be FUD).
So, these days I need to run my tor box on a ramdisk, which has its RAM kept nice and warm, and has its power cut automatically by the intruder alarm. Just so I know where things stand.
If I'm gonna go rigging things up to alarm systems, may as well just set up a thermite reaction TBH.
Now, how hard would it be to design a sort of minimal virtual machine that can run this in parallel with e.g. a Windows host OS? Distribute it via some existing delivery vector, et voila...
in case of search, wouldn't law enforcement agency seize ALL your equipment, not just the one box you point them to saying:
"here's my diskless tor relay. take it!" ?
So? The idea is not to protect your browsing habits. It's to protect the users of your node. They won't leave a (permanent) trace. Of course if they go for your devices they can look at your disks and see what _you_ were doing. Different thing though.
The important thing is storing the ssl key in a secure manner.
[+] [-] mukyu|14 years ago|reply
I fail to see how this solves any problem or is useful deterrence of the police seizing your box.
[+] [-] jpdoctor|14 years ago|reply
It's not a deterrence to seizing the box. It's a deterrence to finding anything on the box after seizing it.
[+] [-] aw3c2|14 years ago|reply
[+] [-] JonnieCache|14 years ago|reply
If I'm gonna go rigging things up to alarm systems, may as well just set up a thermite reaction TBH.
[+] [-] kurumo|14 years ago|reply
[+] [-] robot|14 years ago|reply
[+] [-] scrod|14 years ago|reply
[+] [-] borism|14 years ago|reply
[+] [-] darklajid|14 years ago|reply
The important thing is storing the ssl key in a secure manner.