How would you protect files of a VPS (Virtual Private Server) from snooping by the service provider?

  • Noble Shift@lemmy.world
    link
    fedilink
    arrow-up
    36
    arrow-down
    1
    ·
    1 month ago

    A hacker group in Seattle (GHI) years ago attempted to build secure systems on top of compromised hardware. Although different levels of security could be achieved, the overall outcome was No. You cannot build a fully secured system on top of compromised hardware.

    A VPS for this exercise counts as ‘compromised’ hardware.

    • Possibly linux@lemmy.zip
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      1
      ·
      edit-2
      1 month ago

      Intel is pushing there “encrypted enclave” which supposedly protects the host from being able to read or write guest memory. However, I have serious doubt as it is a black box system. It also is very problematic when a security issue (or backdoor) is found as your data is basically exposed

      Ultimately you are right about this which is sad. I wonder if at some point there could be a zero knowledge cache for https. Maybe double encrypt it and have the client decrypt it fully.

        • Quail4789@lemmy.ml
          link
          fedilink
          English
          arrow-up
          7
          ·
          1 month ago

          I mean, assuming you’re telling the truth about there being a competent group seriously attempting this, it’s still “trust us bro” to conclusively claim it can’t be achieved without providing a shred of evidence. This makes your original comment irrelevant and worthless.