1. You assume that most people know how to pull this directly from memory, most with out experience wouldn't even know where to begin.As long as there is shared memory the host can always catch the encrytion key out of the shared memory. Second thing is that you have to enter the key through VNC on boot. Third thing the disk access is decrypted if the server is running. The host can just jump into your VM.
So why do you want disk encryption on a vm?
Back on topic, there is defiantly overhead associated with doing full disk encryption, you will use more IO and you will notice that it also uses a small chunk of you memory up for the drive encryption. If you are on good hardware, especially SSD, you shouldn't notice too much slow down on IO, but if you test with vs without there would defiantly be a difference in performance. It is a trade off of some resources for the ability to feel a bit more secure.Anyone else encrypt their / and swap on their KVM VPSs? If so, have you noticed any significant decreases in read/write speeds?
1. You assume that most people know how to pull this directly from memory, most with out experience wouldn't even know where to begin.
2. If you as a host are dumping my vnc sessions, we have a whole other conversation we need to be having, mostly about your customer privacy
3. I wasn't aware that KVM had a way you can drop into the server without knowing the root credentials for it, can you give me an example of how this is done? (Seriously, I want to know, I have several testing environments with KVM running and I am yet to figure out how I can just drop into an instance)