Ask Runable forDesign-Driven General AI AgentTry Runable For Free
Runable
Back to Blog
Technology6 min read

Beyond no-log: Tor looks into seizure-proof servers that forget your data | TechRadar

Law enforcement agencies frequently target volunteer-run Tor relays, but a new push for RAM-only servers aims to leave authorities empty-handed Discover insight

TechnologyInnovationBest PracticesGuideTutorial
Beyond no-log: Tor looks into seizure-proof servers that forget your data | TechRadar
Listen to Article
0:00
0:00
0:00

Beyond no-log: Tor looks into seizure-proof servers that forget your data | Tech Radar

Overview

News, deals, reviews, guides and more on the newest smartphones

News, deals, reviews, guides and more on the newest computing gadgets

Details

Start exploring exclusive deals, expert advice and more

Unlock and manage exclusive Techradar member rewards.

Beyond no-log: Tor looks into seizure-proof servers that forget your data

Law enforcement agencies frequently target volunteer-run Tor relays, but a new push for RAM-only servers aims to leave authorities empty-handed

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Unlock instant access to exclusive member features.

Get full access to premium articles, exclusive features and a growing list of member rewards.

The Tor Project is experimenting with stateless, RAM-only relays

The move aims to protect node operators from hardware seizures

Building diskless nodes is technically difficult due to Tor's infrastructure

The Tor Browser has long been the gold standard for anonymous web browsing, but it faces an ongoing physical threat: server raids. Now, the project is exploring a technical upgrade to render hardware seizures completely useless by developing "stateless" relays that wipe themselves clean upon a reboot.

Utilizing RAM-only infrastructure, these diskless Tor nodes are designed to leave behind absolutely no recoverable data, logs, or cryptographic artifacts. They run entirely in random-access memory (RAM).

While the best VPN services adopted this technology years ago to physically back up their privacy claims, Tor's decentralized nature makes diskless servers uniquely challenging to build. However, the upgrade is becoming increasingly necessary.

Dutch authorities seized one of Windscribe VPN's servers – here's everything we know

'Iranians are resilient; they always find ways to speak:' How Iranians are overcoming unprecedented internet censorship

As authorities globally ramp up efforts to unmask users on the dark web, volunteer node operators are facing an escalating risk of physical hardware raids.

The push for stateless infrastructure is being spearheaded by Osservatorio Nessuno, an Italian digital rights non-profit that operates Tor exit relays.

In a guest post published on the Tor Project’s blog, the group noted that "some operators have to deal with seizures, raids, and direct physical access to hardware," citing past server seizures in Austria, Germany, the United States, and Russia.

If an operator's hardware is compromised, traditional disk-based servers can become a massive liability. As the group explains, "A relay that can be seized and its contents handed over erodes the very trust the system depends on."

What if there were Tails for Tor relays? 🔎 Check out our latest guest post by Osservatorio Nessuno who explore how a stateless, diskless operating system can improve #Tor relay security and improve physical attack resistance. https://t.co/x KJHq Bzvxj April 9, 2026

What if there were Tails for Tor relays? 🔎 Check out our latest guest post by Osservatorio Nessuno who explore how a stateless, diskless operating system can improve #Tor relay security and improve physical attack resistance. https://t.co/x KJHq Bzvxj April 9, 2026

By contrast, a stateless system doesn't store anything between reboots.

These types of servers aim to enforce better security by design, guaranteeing that if a machine is cloned or seized by police, there is simply nothing left to analyze.

"The network is designed so that no single operator or server can reconstruct who is talking to whom. Journalists, activists, and whistleblowers depend on that holding up," Osservatorio Nessuno notes.

"Not just censorship, it’s digital isolation:" Iran plans to cut ties with the global internet — and VPNs may not help this time

Amnezia VPN drops new Amnezia WG 2.0 protocol as censorship tactics grow smarter

Iran's internet shutdown proves we need to go beyond Starlink, VPNs — this tech may be the solution

While running a system entirely in RAM isn't a new concept, the privacy-focused infrastructure behind Tor introduces major technical hurdles.

The Tor network is fundamentally reputation-based. Relays that stay online longer earn trust and bandwidth flags, which make them more vital to the network's speed and reliability.

This hard-earned reputation is tied directly to long-term cryptographic identity keys stored on the server. Yet, if a RAM-based relay shuts down and loses those keys, it reboots with no identity, forcing its reputation to start from scratch.

To solve this, researchers are exploring hardware-based workarounds.

One proposed method involves sealing a relay's identity keys within a hardware security chip, known as a Trusted Platform Module (TPM). By binding the key to a specific system state, the identity can survive a reboot without the key ever being directly extractable by authorities who seize the server.

The project is currently in an experimental phase, expanding on discussions initiated at the Tor Community Gathering in 2025. While the Tor network has historically weathered attempts to disable it, moving toward a self-wiping infrastructure could permanently change the game for anonymity, proving that the most secure data is the data that doesn't exist.

Follow Tech Radar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

Rene Millman is a seasoned technology journalist whose work has appeared in The Guardian, the Financial Times, Computer Weekly, and IT Pro. With over two decades of experience as a reporter and editor, he specializes in making complex topics like cybersecurity, VPNs, and enterprise software accessible and engaging.

You must confirm your public display name before commenting

1'Two Hells collide' — Doom: The Dark Ages and Diablo Immortal unite in a limited-time crossover event, The Slayer Reign, this month

2 Spotify is rolling out new video controls, and as someone who hates its in-app music videos, I know this will be a huge hit

38 new movies and TV shows to watch on Netflix, Prime Video, HBO Max, and more this weekend (April 10)

4 Ad Guard VPN has a new app for i Phone — and you can try it out for 7 days for free

5 Amazon is slashing prices on Garmin watches — save up to $350 on best-rated models for running, biking and hiking

Tech Radar is part of Future US Inc, an international media group and leading digital publisher. Visit our corporate site.

© Future US, Inc. Full 7th Floor, 130 West 42nd Street, New York, NY 10036.

Key Takeaways

  • News, deals, reviews, guides and more on the newest smartphones
  • News, deals, reviews, guides and more on the newest computing gadgets
  • Start exploring exclusive deals, expert advice and more
  • Unlock and manage exclusive Techradar member rewards
  • Beyond no-log: Tor looks into seizure-proof servers that forget your data

Cut Costs with Runable

Cost savings are based on average monthly price per user for each app.

Which apps do you use?

Apps to replace

ChatGPTChatGPT
$20 / month
LovableLovable
$25 / month
Gamma AIGamma AI
$25 / month
HiggsFieldHiggsField
$49 / month
Leonardo AILeonardo AI
$12 / month
TOTAL$131 / month

Runable price = $9 / month

Saves $122 / month

Runable can save upto $1464 per year compared to the non-enterprise price of your apps.