http://msec2nnqtbwh5c5yxpiswzwnqperok5k33udj7t6wmqcleu3ifj34sqd.onion/posts/opsec/cloud_provider_adversary/index.html
If used, only
encrypted data should transit/be stored in it and the decryption keys
should never be present anywhere accessible by it. Bare Metal Attack scenarios Live RAM extraction Attack Bob powers down the serve hosting the vps and extracts its RAM,
refrigerate it to analyze its contents Countermeasures Alice would need hardware that supports RAM encryption (such as AMD SEV
and SME).