We're committed to ensuring the security of our infrastructure and our users' data.
Each of the facilities we colocate with enforces multiple layers of security via a variety of technological and human measures. Beyond that, all our equipment is in locked cages.
We enforce strict filtering rules to ensure that Linodes can only communicate using their allowed IP addresses. This prevents Linodes from spoofing other Linodes' IPs or performing man-in-the-middle attacks on our private network.
Linodes themselves operate within Xen virtualization, which ensures that each Linode has its own kernel and userspace, which are fully separate from other Linodes. This ensures that a malicious Linode cannot access either the host itself or other Linodes' resources.