Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Hetzner provide a lot of physical machines too, I believe this is what the other poster was talking about.


Physical machines don't prevent keys from leaking out. A physical attacker can analyze power usage usage patterns to extract the encryption key. :)


I don't think you have that sidechannel with AES-NI. Besides, as a physical attacker cold boot attack would be much easier Or if the server has any interfaces with DMA, like PCI or something, that's even easier.


Wouldn't that require physical access?


Ah, I missed the physical machines. No hypervisor to crack, just out of band management cards. :)




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: