/top/
/new/
/best/
/ask/
/show/
/job/
^
slacker news
login
about
←back to thread
Mitigating the Hetzner/Linode XMPP.ru MitM interception incident
(www.devever.net)
341 points
hlandau
| 1 comments |
20 Oct 23 20:31 UTC
|
HN request time: 0s
|
source
Show context
liquidk
◴[
20 Oct 23 23:06 UTC
]
No.
37962482
[source]
▶
>>37961166 (OP)
#
The provider has access to the host, they can just inspect the job from the outside and you won’t be able to tell
replies(3):
>>37962632
#
>>37962862
#
>>37963439
#
the8472
◴[
20 Oct 23 23:27 UTC
]
No.
37962632
[source]
▶
>>37962482
#
secure boot + virtualized memory encryption is supposed to prevent that, you'll have to trust intel/amd though.
replies(4):
>>37962858
#
>>37963072
#
>>37963119
#
>>37963152
#
1.
lallysingh
◴[
21 Oct 23 00:57 UTC
]
No.
37963152
[source]
▶
>>37962632
#
Those are best for compliance to security requirements/ standards. They're not for security against state level actors.
ID:
GO
↑