Bitcoin Forum
June 15, 2024, 04:30:02 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2]  All
  Print  
Author Topic: Home node question...  (Read 1529 times)
notlist3d
Legendary
*
Offline Offline

Activity: 1456
Merit: 1000



View Profile
April 27, 2015, 07:34:48 AM
 #21

As for having your ip publicly known as a bitcoin node ip, the problem might be that somebody might funnel a rogue transaction through it, and you'd be on the receiving end of govt thugs trying to find the culprit. This has already happened before. The chance is most likely miniscule for it to happen, but it's worth knowing about. Also, I'm not sure if this is implemented already, but certainly in the future, all bitcoin node ip's will be monitored, and perhaps you get an IRS-letter demanding you to declare your "bitcoin stash". This might depend on where you live as well. As the ip is linked directly to your isp-account it's straightforward to find your identity, provided you do use your real identity. I might be splitting hairs here, but I'm just saying..

It is great you want to support the network!
You can't just "funnel a rogue transaction" through someone's node because of the decentralized system. Any transaction sent to that node will be broadcast to the node's peers and thus to everyone. Hence the decentralization.


Also, I'm not sure if this is implemented already, but certainly in the future, all bitcoin node ip's will be monitored,

According to who? And by who?
Not necessarily monitored, but all nodes are listed by the getaddr.bitnodes.io project. One way to prevent monitoring or having your node publicly available is to route all node traffic through tor.

tor is not really that secure, even tor is a bit monitorided, better to use some that don't keep your log, there are many that are free too, or make your own vp network

Very true about Tor.  As long as it relays on exit nodes there will always be a risk.   I personally would not trust Tor with anything important.  It seems to give people a false sense of security.

I personally think there are much better alternatives. 
achow101_alt
Sr. Member
****
Offline Offline

Activity: 268
Merit: 256


View Profile
April 27, 2015, 08:18:13 PM
 #22

tor is not really that secure, even tor is a bit monitorided, better to use some that don't keep your log, there are many that are free too, or make your own vp network

Very true about Tor.  As long as it relays on exit nodes there will always be a risk.   I personally would not trust Tor with anything important.  It seems to give people a false sense of security.

It is impossible for the tor exit nodes to log your ip. While there are risks with tor exit nodes, tor forces https so that your data is always secure after leaving the exit node. It is in fact rather secure, probably more so than anything you can think of.

I personally think there are much better alternatives. 
Could you say what these better alternatives are?

Tip Me!: 1AQx99s7q1wVinbgXbA48BaZQVWpHe5gYM | My PGP Key: Fingerprint 0x17565732E08E5E41
Pages: « 1 [2]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!