http://www.w5j6stm77zs6652pgsij4awcjeel3eco7kvipheu6mtr623eyyehj4yd.onion/wiki/Encrypted_Images
Nevertheless, for the interested reader this section makes recommendations to deal with the following threat model: The host is running when an adversary gets access to it, or the host is unencrypted. The VM is powered down (otherwise the adversary would already have access to it). The following security considerations are based on modified quotes by Iszi from the answer posted on security.stackexchange.com , which was a user contribution to stackexchange, licensed under...