hosting
hosting copied to clipboard
Use container systems like docker or LXC
Container systems allow finer resource control and protection from privilege escalation. Should one service have a vulnerability that allows shell access or similar, breaking out of the container would be an additional hurdle before a full compromise.
Docker will whwe e a nice option thats my next project. But one docker instance for one onion ?