an ominous comment

rysiek rysiek at hackerspace.pl
Sun Jul 19 02:34:39 PDT 2015


Dnia niedziela, 19 lipca 2015 10:15:38 Florian Weimer pisze:
> * Georgi Guninski:
> > You should be aware of the numerous virtualization
> > sploits -- Xen, Qemu, possibly others.
> > 
> > Exploiting a virtualization bug is just the fee
> > "to be in cloud" and I _suspect_ more efforts
> > are needed for my boxen.
> 
> Not all service providers hand you the capability to run arbitrary
> code to run VM exploits, so you have to exploit an application bug
> first.  (And the application may even run on bare metal.)
> 
> Service providers can also provision VMs in such a way that customers
> can only attack themselves.

I consider service providers' access to my data a problem in and of itself.

-- 
Pozdrawiam,
Michał "rysiek" Woźniak

Zmieniam klucz GPG :: http://rys.io/pl/147
GPG Key Transition :: http://rys.io/en/147
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 931 bytes
Desc: This is a digitally signed message part.
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20150719/81a8f743/attachment-0003.sig>


More information about the cypherpunks mailing list