- cross-posted to:
- technology@lemmy.ml
- technology@lemmy.world
- hackernews@derp.foo
- cross-posted to:
- technology@lemmy.ml
- technology@lemmy.world
- hackernews@derp.foo
Today we announce that we have completely removed all traces of disks being used by our VPN infrastructure!
Because by knowing which IP is the boot image stored from, law enforcement can locate the source of the unencrypted image, thus making the scheme lose its privacy. The only way to bypass the issue is by manually configuring the IP after every reboot and keeping it a secret.
Why does being able to access the unencrypted image pose such a problem?
Because by doing so, law enforcement can manipulate the image from the source by:
Unless, of course, the BIOS stores the checksum of the untainted image. (Which adds its own can of worms, because that would make legitimate image upgrades require writing the new proper checksum on each server)