Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


Trusted Low End Providers? - Page 2
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

Trusted Low End Providers?

2»

Comments

  • don't trust nobody. not even yourself.

    Thanked by 2sasslik c1vhosting
  • @thane said:
    Trusted
    Low end
    Providers

    You may only pick 2.

    what's trusted lowend?

  • @omelas said:

    @thane said:
    Trusted
    Low end
    Providers

    You may only pick 2.

    what's trusted lowend?

    Many users that have no provider tag lol 😆

    Thanked by 2omelas commercial
  • You cannot. You cannot trust the larger players including AWS if you are processing very confidential porn videos. You can use encryption but technically it is still not 100% secure if the gov't wants to see your top secret porn videos.

  • @tentor said:

    @hyperblast said:

    @tentor said:

    @hyperblast said:

    @tentor said:

    @damarns said: How do we trust providers for not seeing to our VMs?

    If you don't, there is no reason to do so. Use dedicated servers (like physical machines, not virtual ones) for confidential things, as well as encrypt its' storage.

    or encrypt kvm vps. do you have a how-to?

    Useless. VM with LUKS can be easily decrypted as hypervisor owner has access to the VM's RAM (where LUKS key is stored)

    really easily?

    There are plenty of guides on Internet, moreover I have accomplished such task in a test environment. I haven't done anything similar regarding a dedicated server as it requires more effort for extracting keys from the RAM.

    Dedicated server requiring more effort is putting it nicely i'd say. At that point it's probably better to just use a small hickup in power supply to backdoor the boot partition and log the key when it get's entered.

    In regards to KVM there are a couple options to at least obscure the key in memory but it's still only security through obscurity after all and the amount of effort needed to make this happen is likely out of OPs (or most general users) possibilities anyways.

    Thanked by 1tentor
  • tentortentor Member, Host Rep

    @totally_not_banned said: backdoor the boot partition and log the key when it get's entered

    It may be complicated if you use true FDE and sign GRUB to take advantage of (U)EFI Secure Boot, but you got my point.

    Thanked by 1totally_not_banned
  • @TheGreatOakley said:
    All providers from Romania. Can't go wrong.

    My comment ages like a fine wine with everyday.

    Thanked by 1Void
  • @thane said:
    Trusted
    Low end
    Providers

    You may only pick 2.

    or one.

  • @thane said:
    Trusted
    Low end
    Providers

    You may only pick 2.

    Trusted and low end. 127.0.0.1.

  • I am very confident in @Calin / Ihostart ...
    He will never go and look at my contents of his servers. Rumor has it that he himself doesn't have access ;p

    Thanked by 2Calin marcopolio
  • high end provider on this low end forum: buyvm/frantech

    Thanked by 2Francisco crunchbits
  • @unsafetypin said:
    high end provider on this low end forum: buyvm/frantech

    amen

    Thanked by 1Francisco
  • yoursunnyyoursunny Member, IPv6 Advocate

    @damarns said:
    selling cheap or even free service but they took customers’ source codes and sell them on marketplace.

    Mentally strong devloper wouldn't fear their source code getting exposed / published.
    They get paid by providing support and customisation of the source code to fit specific needs.
    Once written, the source code is open to all and belongs to the world.
    Those $4.99/year NAT KVM panel or $10/year five/seven/ten apps are from greedy weaklings who don't dare to publish under an open license.

Sign In or Register to comment.