diff --git a/opsec/cloud_provider_adversary/index.html b/opsec/cloud_provider_adversary/index.html index f2625a5..19c8d43 100644 --- a/opsec/cloud_provider_adversary/index.html +++ b/opsec/cloud_provider_adversary/index.html @@ -195,7 +195,7 @@ in this post we are going to do a threat modelling exercise:

Bob makes a RAM snapshot of the virtual machine. on a VPS it is very easy and can be done without notice.

Countermeasures

- Can't be addressed without renting a bare-metal server instead. Alice would need the baremetal server's hardware to support RAM encryption (such as AMD SEV and Intel SGX, where the idea is to store the encryption keys in the CPU directly instead of storing it in the RAM). + Can't be addressed without renting a bare-metal server instead. Alice would need the baremetal server's hardware to support RAM encryption (such as AMD SEV and Intel SGX, where the idea is to store the encryption keys in the CPU directly instead of storing it in the RAM).

Malicious Libvirt or Xen Interception