Sorry but I don't quite understand your post. Are you saying that Tor Browser software installed WannaCry virus on your computer? can you give more details? I just don't get it, how that's even possible?
I was using vidalia.exe that comes with a proxy server (privoxy.exe) directly from win-sockets within my code to pull pages from
all over the internet and I am sure many of these site would be pushing viruses that rely on javascript and browser exploits but thats
not going to infect a machine that's not browsing and is simply parsing the HTML from the pages and nothing else was even running
on the machine because it was dedicated to this simple task when it picked up WannaCry
No I am not 100% sure it must had been Tor itself but I would say 99% sure this is what happened
My reason for scanning the internet via Tor was to count the number of active web-sites in use that are not just
domain parked or are using 302 redirects back to central servers and part of the process was fooling google search to
give up a few of it's secrets or else they cut you off if you do too many searches.
Believe me I was a big time fan of Tor before this happened, nice tool in the box but look around and you will find
other cracks that people are talking about and also note that the number of exit nodes always stays at around 300
and the other draw back is they have all become well known and blocked by most sites.
I ran Tor once as an exit node and it got little to no traffic and I know this because I was running my own version of
Wireshark on the machine so again I say that all is not as it seems.
Isn't vidalia very outdated? I haven't heard about that since ancient versions of Tor..
How about using Tails? Wouldn't the transactions made through Bitcoin Core be relayed through Tor by default without needing to do anything?
I just don't like the idea of not using something when broadcasting a transaction. You are making a transaction through your real IP, this doesn't seem too safe. But then again Tor doesn't seem too safe too from what im reading, I also don't want to host anything that could incriminate me somehow, I've read people running Tor nodes that never did anything wrong, ended up raided somehow.. no thanks. Could this happen if you need to host your own hidden service too?
Tor works by using relay nodes and exit nodes. Exit nodes are the ones responsible for getting your data relayed to the clear web. Relay nodes just bounce the data within the network and they are pretty safe since they aren't responsible for relaying information to the clearweb.
Isn't Electrum safer than using a full node with your real IP? I mean the transaction in Electrum goes through some server, and not your IP directly.. it's a similar model to VPN where you would need to trust that whoever running the SPV server is not selling logs.
Im not doing anything ilegal btw, I just don't like the idea of people having your real IP when you are transacting.
Bitcoin Core is by far the best for privacy. The way Electrum client works is that they send your addresses to an Electrum server that is run by the community. This could expose your privacy quite significantly. Bitcoin Core doesn't do this since they store the whole blockchain. Peers would not know who sent the transaction when using Bitcoin Core. The peers would only know that you've relayed a transaction but they wouldn't know who sent the transaction.
I know, I thought that you could somehow trace it if you didn't use a proxy and so relaying throught a server (Electrum) would be more private than clearnet full node transaction but it seems it's safe:
https://bitcoin.stackexchange.com/questions/56682/understanding-ip-address-tracing-via-bitcoin-transaction
I find that claim (tracing the IP address of a transaction) highly suspect as transactions don't have an IP address associated with them. Once a transaction has been broadcast, it is incredibly difficult to figure out what IP address first sent the address. To do so requires that you have a connection to every single node and wallet and determine the IP address by seeing which node first broadcast a transaction. Otherwise you cannot figure out what IP address a transaction originated from.
The person you met may have meant that he traced the Bitcoin addresses in a transaction to figure out who spent created the transaction. That is far easier to do and far less expensive as you only need a copy of the blockchain to do so.
Still, would be cool to easily transact through Tor safely. If I do what nullius said, I don't need to fear any random raids right?