top | item 3091334

Tor-ramdisk

79 points| rl1987 | 14 years ago |opensource.dyc.edu | reply

15 comments

order
[+] mukyu|14 years ago|reply
A server without disks can just as easily serve files as it can run a Tor node.

I fail to see how this solves any problem or is useful deterrence of the police seizing your box.

[+] jpdoctor|14 years ago|reply
> I fail to see how this solves any problem or is useful deterrence of the police seizing your box.

It's not a deterrence to seizing the box. It's a deterrence to finding anything on the box after seizing it.

[+] aw3c2|14 years ago|reply
Yes, and I would rather have law enforcement find nothing incriminating on my harddisk than being accused of obfuscation or destroying of evidence (this might be FUD).
[+] JonnieCache|14 years ago|reply
So, these days I need to run my tor box on a ramdisk, which has its RAM kept nice and warm, and has its power cut automatically by the intruder alarm. Just so I know where things stand.

If I'm gonna go rigging things up to alarm systems, may as well just set up a thermite reaction TBH.

[+] kurumo|14 years ago|reply
Now, how hard would it be to design a sort of minimal virtual machine that can run this in parallel with e.g. a Windows host OS? Distribute it via some existing delivery vector, et voila...
[+] robot|14 years ago|reply
Never thought uClinux would be used for such purpose.
[+] scrod|14 years ago|reply
Perfect! Combine with your choice of the following for plug-n-play subversion:

  http://www.linuxfordevices.com/c/a/News/Linux-system-squishes-into-Ethernet-connector/
  http://pwnieexpress.com/
  http://www.gumstix.com/
  http://www.raspberrypi.org/
[+] borism|14 years ago|reply
in case of search, wouldn't law enforcement agency seize ALL your equipment, not just the one box you point them to saying: "here's my diskless tor relay. take it!" ?
[+] darklajid|14 years ago|reply
So? The idea is not to protect your browsing habits. It's to protect the users of your node. They won't leave a (permanent) trace. Of course if they go for your devices they can look at your disks and see what _you_ were doing. Different thing though.

The important thing is storing the ssl key in a secure manner.