Bitcoin Forum
April 30, 2024, 11:04:24 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Poll
Question: Are you running Bitcoin Core through Tor?
Yes - 9 (40.9%)
No - 13 (59.1%)
Total Voters: 22

Pages: « 1 [2] 3 »  All
  Print  
Author Topic: Are you running Bitcoin Core through Tor? Should it be a requirement?  (Read 754 times)
satscraper
Hero Member
*****
Offline Offline

Activity: 714
Merit: 1324


Cashback 15%


View Profile
August 04, 2023, 06:44:04 PM
Last edit: August 05, 2023, 06:48:36 AM by satscraper
 #21

/\
II
Well, don't take offence, just  read:

1)Bitcoin over Tor isn’t a good idea
2) Deanonymizing Tor hidden service users through Bitcoin transactions analysis.
3)Bitcoin network-based anonymity and privacy model for metaverse implementation in Industry 5.0 using linear Diophantine fuzzy sets

and research:

 1)a simple (and rather ad-hoc) port scanner for Tor hidden services
2) Bitcoin Network Probing Tool

I think it's enough for the start. Wink

However, it seems to me that you have missed the main reason why I against TOR for my node - I don't want to be blacklisted.


if using it I would be blacklisted by my government.



It is a wrong assumption that you can escape the  fate  of those TOR users who are already in that list.

https://restoreprivacy.com/tor/

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
1714518264
Hero Member
*
Offline Offline

Posts: 1714518264

View Profile Personal Message (Offline)

Ignore
1714518264
Reply with quote  #2

1714518264
Report to moderator
1714518264
Hero Member
*
Offline Offline

Posts: 1714518264

View Profile Personal Message (Offline)

Ignore
1714518264
Reply with quote  #2

1714518264
Report to moderator
1714518264
Hero Member
*
Offline Offline

Posts: 1714518264

View Profile Personal Message (Offline)

Ignore
1714518264
Reply with quote  #2

1714518264
Report to moderator
BitcoinCleanup.com: Learn why Bitcoin isn't bad for the environment
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
DireWolfM14
Copper Member
Legendary
*
Offline Offline

Activity: 2170
Merit: 4237


Join the world-leading crypto sportsbook NOW!


View Profile WWW
August 04, 2023, 08:44:04 PM
Merited by o_e_l_e_o (4)
 #22

Bitcoin as a decentralized network, for the people, by the people should provide as many options as possible to make it easy for all types to use.  So, no it should not force TOR onto it's users.  Some folks will require more privacy than others, such as those who live where bitcoin is banned, but others who don't need the IP privacy should be able to use faster, less congestive, more accessible networks.  As mocacinno said, there're other ways to maintain privacy, since no one can determine if a node originated the transaction or merely broadcast it.  Especially if a node has both, clearnet and TOR enabled.

The sad truth is that most people who were born after 1985 have no clue what privacy really looks like, and couldn't care less about it.  They're used to living in world with cameras everywhere, including one in every pocket of every human they encounter.  Geezers such as myself are still distrustful and skeptical of the Surveillance States that have taken over the majority of our national governments.  But that doesn't mean I won't troll them.  So, unlike o_e_l_e_o I have one node server running both clearnet and TOR, but I never transmit any transactions over that node.  

I run two other nodes purely over TOR; one is my desktop hot wallet, and another server for SPV services.  So, whether I use Electrum, or just transact through my Bitcoin wallet, I know that my transactions are likely to be routed through TOR.  I say "likely" because there is a chink in my armor; all three are configured with addnode to connect to each other using my local LAN IPs, so in reality I don't know which of the three is going to broadcast my transactions to the rest of the network.  But that's a decision I made fully conscious of the risks, and it's something I can change in about 30 seconds.

So, why do I want to troll my government?  They deserve it, and should be put on notice!  The Federal Reserve is a leading cause of corruption within our economic structure (banks are too big to fail? WTF) and facilitates the federal government's overreach of power.  Not to mention it's unconstitutional.  

So yeah, bitches!  I'm using bitcoin every chance I get.

  ▄▄███████▄███████▄▄▄
 █████████████
▀▀▀▀▀▀████▄▄
███████████████
       ▀▀███▄
███████████████
          ▀███
 █████████████
             ███
███████████▀▀               ███
███                         ███
███                         ███
 ███                       ███
  ███▄                   ▄███
   ▀███▄▄             ▄▄███▀
     ▀▀████▄▄▄▄▄▄▄▄▄████▀▀
         ▀▀▀███████▀▀▀
░░░████▄▄▄▄
░▄▄░
▄▄███████▄▀█████▄▄
██▄████▌▐█▌█████▄██
████▀▄▄▄▌███░▄▄▄▀████
██████▄▄▄█▄▄▄██████
█░███████░▐█▌░███████░█
▀▀██▀░██░▐█▌░██░▀██▀▀
▄▄▄░█▀░█░██░▐█▌░██░█░▀█░▄▄▄
██▀░░░░▀██░▐█▌░██▀░░░░▀██
▀██
█████▄███▀▀██▀▀███▄███████▀
▀███████████████████████▀
▀▀▀▀███████████▀▀▀▀
▄▄██████▄▄
▀█▀
█  █▀█▀
  ▄█  ██  █▄  ▄
█ ▄█ █▀█▄▄█▀█ █▄ █
▀▄█ █ ███▄▄▄▄███ █ █▄▀
▀▀ █    ▄▄▄▄    █ ▀▀
   ██████   █
█     ▀▀     █
▀▄▀▄▀▄▀▄▀▄▀▄
▄ ██████▀▀██████ ▄
▄████████ ██ ████████▄
▀▀███████▄▄███████▀▀
▀▀▀████████▀▀▀
█████████████LEADING CRYPTO SPORTSBOOK & CASINO█████████████
MULTI
CURRENCY
1500+
CASINO GAMES
CRYPTO EXCLUSIVE
CLUBHOUSE
FAST & SECURE
PAYMENTS
.
..PLAY NOW!..
o_e_l_e_o
In memoriam
Legendary
*
Offline Offline

Activity: 2268
Merit: 18509


View Profile
August 05, 2023, 08:37:33 AM
 #23

By discovering   TOR packets in users' traffic  they suspect  them in  illicit activities  and put  those users into blacklist for further scrutiny. This is the common practice for almost all governments.

I know one can  obfuscate TOR traffic. However, government is no slouch when it comes to  discover such traffic.
And if they are doing this for Tor, what makes you think they aren't doing the same thing for VPNs? If you think they can pick up on Tor pluggable transports such as obfs4 and meek, then they can definitely pick up on VPN traffic. It's also far easier for the government to set up a malicious VPN service or to subpoena existing VPN services to hand over data than it is for them to do the same thing Tor nodes.

If you really wanted, then you can always connect to Tor via your VPN.
Synchronice
Hero Member
*****
Offline Offline

Activity: 840
Merit: 772


Watch Bitcoin Documentary - https://t.ly/v0Nim


View Profile
August 05, 2023, 10:46:20 AM
 #24

By discovering   TOR packets in users' traffic  they suspect  them in  illicit activities  and put  those users into blacklist for further scrutiny. This is the common practice for almost all governments.

I know one can  obfuscate TOR traffic. However, government is no slouch when it comes to  discover such traffic.
And if they are doing this for Tor, what makes you think they aren't doing the same thing for VPNs? If you think they can pick up on Tor pluggable transports such as obfs4 and meek, then they can definitely pick up on VPN traffic. It's also far easier for the government to set up a malicious VPN service or to subpoena existing VPN services to hand over data than it is for them to do the same thing Tor nodes.

If you really wanted, then you can always connect to Tor via your VPN.
Lots of people use VPN for gaming, streaming and for unblocking limited apps and content on smartphones, smartTVs, etc. I think it doesn't worth to blacklist all of them because I guess majority of internet users have used VPNs at least once in their life while 90% of them probably have never even downloaded Tor.

I'm just saying that to my mind, there is a high chance that they aren't blacklisting VPN users. I wouldn't worry about this fact if you work remotely for a company and can travel in eastern Europe. Things are rarely regulated in Eastern European countries, people, police and even higher ones are rarely educated about this staff. Things aren't as controlled as in the West.
Every IT worker who appreciates privacy, should aim to become a digital nomad.

.freebitcoin.       ▄▄▄█▀▀██▄▄▄
   ▄▄██████▄▄█  █▀▀█▄▄
  ███  █▀▀███████▄▄██▀
   ▀▀▀██▄▄█  ████▀▀  ▄██
▄███▄▄  ▀▀▀▀▀▀▀  ▄▄██████
██▀▀█████▄     ▄██▀█ ▀▀██
██▄▄███▀▀██   ███▀ ▄▄  ▀█
███████▄▄███ ███▄▄ ▀▀▄  █
██▀▀████████ █████  █▀▄██
 █▄▄████████ █████   ███
  ▀████  ███ ████▄▄███▀
     ▀▀████   ████▀▀
BITCOIN
DICE
EVENT
BETTING
WIN A LAMBO !

.
            ▄▄▄▄▄▄▄▄▄▄███████████▄▄▄▄▄
▄▄▄▄▄██████████████████████████████████▄▄▄▄
▀██████████████████████████████████████████████▄▄▄
▄▄████▄█████▄████████████████████████████▄█████▄████▄▄
▀████████▀▀▀████████████████████████████████▀▀▀██████████▄
  ▀▀▀████▄▄▄███████████████████████████████▄▄▄██████████
       ▀█████▀  ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀  ▀█████▀▀▀▀▀▀▀▀▀▀
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.PLAY NOW.
Knight Hider
Member
**
Offline Offline

Activity: 239
Merit: 59

a young loner on a crusade


View Profile
August 05, 2023, 04:19:06 PM
 #25

While very interesting to read, this paper is about deanonymizing the users of hidden services. It's not about deanonymizing Bitcoin Core users. They associated Bitcoin addresses with online identities on Twitter and Bitcointalk. Some of them could be linked to real identities. That's not because they used Bitcoin Core through Tor, it's because they posted addresses in public places. Using a VPN instead of Tor doesn't change that.

ABSTRACT
With the rapid increase of threats on the Internet, people are contin-
uously seeking privacy and anonymity. Services such as Bitcoin and
Tor were introduced to provide anonymity for online transactions
and Web browsing. Due to its pseudonymity model, Bitcoin lacks
retroactive operational security, which means historical pieces of
information could be used to identify a certain user. We investigate
the feasibility of deanonymizing users of Tor hidden services who
rely on Bitcoin as a payment method by exploiting public informa-
tion leaked from online social networks, the Blockchain, and onion
websites. This, for example, allows an adversary to link a user with
@alice Twitter address to a Tor hidden service with private.onion
address by finding at least one past transaction in the Blockchain
that involves their publicly declared Bitcoin addresses.
To demonstrate the feasibility of this deanonymization attack,
we carried out a real-world experiment simulating a passive, lim-
ited adversary. We crawled 1.5K hidden services and collected 88
unique Bitcoin addresses. We then crawled 5B tweets and 1M Bit-
coinTalk forum pages and collected 4.2K and 41K unique Bitcoin
addresses, respectively. Each user address was associated with an
online identity along with its public profile information. By ana-
lyzing the transactions in the Blockchain, we were able to link 125
unique users to 20 Tor hidden services, including sensitive ones,
such as The Pirate Bay and Silk Road. We also analyzed two case
studies in detail to demonstrate the implications of the resulting
information leakage on user anonymity. In particular, we confirm
that Bitcoin addresses should always be considered exploitable, as
they can be used to deanonymize users retroactively. This is espe-
cially important for Tor hidden service users who actively seek and
expect privacy and anonymity.

They didn't compromise Bitcoin Core through Tor. If someone posts his Bitcoin address here and makes a payment to an address posted on a hidden website, it's not that difficult to put one and one together. It's also not that difficult to avoid.

Quote
4.3 Limitations
Our work has two main limitations. First, in our analysis, we assume
that linking a user, represented as an online identity, to a hidden
service is sufficient to deanonymize the user. However, this is not
always true. Users can always create fake online identities in order
to hide their real ones. While doing so improves their anonymity,
once the links are established the adversary can perform online
surveillance to track down the users and uncover their true identi-
ties. The second limitation is related to the use of mixing services.
While the wallet-closure cleaning process we used eliminates the
effect of mixing, it is aggressive and can exclude users who did not
use mixing services at all. Accordingly, our results under estimates
the prevalence of the deanonymization threat.

--Knight Hider

in a world of criminals who operate above the law
one man can make a difference and you are going to be that man
satscraper
Hero Member
*****
Offline Offline

Activity: 714
Merit: 1324


Cashback 15%


View Profile
August 05, 2023, 04:57:20 PM
 #26

By discovering   TOR packets in users' traffic  they suspect  them in  illicit activities  and put  those users into blacklist for further scrutiny. This is the common practice for almost all governments.

I know one can  obfuscate TOR traffic. However, government is no slouch when it comes to  discover such traffic.
And if they are doing this for Tor, what makes you think they aren't doing the same thing for VPNs? If you think they can pick up on Tor pluggable transports such as obfs4 and meek, then they can definitely pick up on VPN traffic. It's also far easier for the government to set up a malicious VPN service or to subpoena existing VPN services to hand over data than it is for them to do the same thing Tor nodes.

If you really wanted, then you can always connect to Tor via your VPN.

As I have already repeatedly said my main concern with TOR is not-zero-probability to be blacklisted and further scrutinized rather than to be  personally identified. 

And yeah, they can set malicious VPN service that is why user must carefully select the one he could trust. The preliminary research is the best thing he can do before paying for VPN.

Tor via VPN, yeah, it might be solution, but I'm not sure if they have power to strip off VPN packets (even XORed) that enveloped the relevant TOR ones and thus blacklist me.



.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
satscraper
Hero Member
*****
Offline Offline

Activity: 714
Merit: 1324


Cashback 15%


View Profile
August 06, 2023, 10:37:00 AM
Last edit: August 06, 2023, 02:28:45 PM by satscraper
 #27

Poll results shows that ~ 2/3 of bitcointalk users use clearnet to run their nodes, the rest utilize darknet. At the same time,  statistics gathered  by  Bitnodes  API reveals opposite result - 82% of nodes route their traffic via TOR".

Any thought on this obvious  discrepancy?

P.S. My explanation is that most of  darknet nodes are running by agencies/institutions who are nor bother yourself to be present on bitcointalk.


.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
Synchronice
Hero Member
*****
Offline Offline

Activity: 840
Merit: 772


Watch Bitcoin Documentary - https://t.ly/v0Nim


View Profile
August 06, 2023, 11:17:43 AM
 #28


By discovering   TOR packets in users' traffic  they suspect  them in  illicit activities  and put  those users into blacklist for further scrutiny. This is the common practice for almost all governments.

I know one can  obfuscate TOR traffic. However, government is no slouch when it comes to  discover such traffic.
And if they are doing this for Tor, what makes you think they aren't doing the same thing for VPNs? If you think they can pick up on Tor pluggable transports such as obfs4 and meek, then they can definitely pick up on VPN traffic. It's also far easier for the government to set up a malicious VPN service or to subpoena existing VPN services to hand over data than it is for them to do the same thing Tor nodes.

If you really wanted, then you can always connect to Tor via your VPN.
Lots of people use VPN for gaming, streaming and for unblocking limited apps and content on smartphones, smartTVs, etc. I think it doesn't worth to blacklist all of them because I guess majority of internet users have used VPNs at least once in their life while 90% of them probably have never even downloaded Tor.

Block all VPN? Probably no, but some government definitely put some effort to reduce VPN usage (e.g. ban certain VPN provider) or prevent using VPN privately (e.g. legally require VPN provider to log user data).
I talk about Western countries in this case. We have that freedom, if you move your ass, you can protect your identity online. Western countries can block VPNs but they don't do it, they leave some room for those who want freedom and I think that's a clever strategy.
By the way, your country blacklists people because of Tor usage but you are a digital nomad, you can change things. You can move in countries like Armenia, Moldova, Georgia and you'll have a huge digital freedom. It's another task whether you'll enjoy life there.
Overall, in life, if you want to get something, you have to give something.

.freebitcoin.       ▄▄▄█▀▀██▄▄▄
   ▄▄██████▄▄█  █▀▀█▄▄
  ███  █▀▀███████▄▄██▀
   ▀▀▀██▄▄█  ████▀▀  ▄██
▄███▄▄  ▀▀▀▀▀▀▀  ▄▄██████
██▀▀█████▄     ▄██▀█ ▀▀██
██▄▄███▀▀██   ███▀ ▄▄  ▀█
███████▄▄███ ███▄▄ ▀▀▄  █
██▀▀████████ █████  █▀▄██
 █▄▄████████ █████   ███
  ▀████  ███ ████▄▄███▀
     ▀▀████   ████▀▀
BITCOIN
DICE
EVENT
BETTING
WIN A LAMBO !

.
            ▄▄▄▄▄▄▄▄▄▄███████████▄▄▄▄▄
▄▄▄▄▄██████████████████████████████████▄▄▄▄
▀██████████████████████████████████████████████▄▄▄
▄▄████▄█████▄████████████████████████████▄█████▄████▄▄
▀████████▀▀▀████████████████████████████████▀▀▀██████████▄
  ▀▀▀████▄▄▄███████████████████████████████▄▄▄██████████
       ▀█████▀  ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀  ▀█████▀▀▀▀▀▀▀▀▀▀
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.PLAY NOW.
BlackHatCoiner
Legendary
*
Online Online

Activity: 1498
Merit: 7307


Farewell, Leo


View Profile
August 06, 2023, 02:13:51 PM
 #29

As I have already repeatedly said my main concern with TOR is not-zero-probability to be blacklisted and further scrutinized rather than to be  personally identified.
Who blacklists Tor? It is by design censorship resistant. I'm rather getting my local IP address censored, because as a citizen I'm forbidden to access certain websites in my country.

Tor via VPN, yeah, it might be solution
What's the point of that? The VPN provider will be able to de-anonymize your Tor activity, and can blacklist / censor / scrutinize you further, which is your concern as you're saying.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
un_rank
Hero Member
*****
Offline Offline

Activity: 700
Merit: 680


- Jay -


View Profile WWW
August 06, 2023, 05:59:07 PM
 #30

Poll results shows that ~ 2/3 of bitcointalk users use clearnet to run their nodes, the rest utilize darknet. At the same time,  statistics gathered  by  Bitnodes  API reveals opposite result - 82% of nodes route their traffic via TOR".
I am not sure if it is a typo but the calculations taken to arrive at 82% looks flawed from the article text:
Quote
The data shows that a significant portion of bitcoin nodes — 8,162 out of 14,838, nearly 82% — cannot be accurately located thanks to them routing their traffic through the Tor network
Those figures should give a total within the region of 55% and not 82%.

You can also not take a pool of 20 users who we cannot guarantee actually run a node to be any accurate.

- Jay -

██████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
██████████████████████
.SHUFFLE.COM..███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
█████████████████████
████████████████████
██████████████████████
████████████████████
██████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
██████████████████████
██████████████████████
██████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
.
...Next Generation Crypto Casino...
satscraper
Hero Member
*****
Offline Offline

Activity: 714
Merit: 1324


Cashback 15%


View Profile
August 07, 2023, 03:41:00 AM
Last edit: August 07, 2023, 03:56:38 AM by satscraper
 #31


Who blacklists Tor? It is by design censorship resistant.

Yeah, it is designed to be censorship resistant, but its packets have some recognizable  patterns that allow to mark the relevant network traffic as to be originated from TOR app.

Poll results shows that ~ 2/3 of bitcointalk users use clearnet to run their nodes, the rest utilize darknet. At the same time,  statistics gathered  by  Bitnodes  API reveals opposite result - 82% of nodes route their traffic via TOR".
I am not sure if it is a typo but the calculations taken to arrive at 82% looks flawed from the article text:
Quote
The data shows that a significant portion of bitcoin nodes — 8,162 out of 14,838, nearly 82% — cannot be accurately located thanks to them routing their traffic through the Tor network
Those figures should give a total within the region of 55% and not 82%.

You can also not take a pool of 20 users who we cannot guarantee actually run a node to be any accurate.

- Jay -

My fault, I didn't check the math on article text.

Given the exceedingly slow number of users who have participated  in the poll  I would consider ~50% to be reasonable estimate.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
un_rank
Hero Member
*****
Offline Offline

Activity: 700
Merit: 680


- Jay -


View Profile WWW
August 07, 2023, 06:49:39 AM
 #32

Yeah, it is designed to be censorship resistant, but its packets have some recognizable  patterns that allow to mark the relevant network traffic as to be originated from TOR app.
TOR users are more interested in hiding their identity and masking their ip addresses than the fact that they are using TOR.

Given the exceedingly slow number of users who have participated  in the poll  I would consider ~50% to be reasonable estimate.
If the poll is already flawed you cannot imply calculate for errors and assume that is a reasonable estimate.

- Jay -

██████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
██████████████████████
.SHUFFLE.COM..███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
█████████████████████
████████████████████
██████████████████████
████████████████████
██████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
██████████████████████
██████████████████████
██████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
.
...Next Generation Crypto Casino...
citb0in
Hero Member
*****
Offline Offline

Activity: 658
Merit: 656


Bitcoin g33k


View Profile
August 07, 2023, 08:09:45 AM
 #33

I run my bitcoin core node through Starlink, but there was no selection field in the survey  Roll Eyes Tongue

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
o_e_l_e_o
In memoriam
Legendary
*
Offline Offline

Activity: 2268
Merit: 18509


View Profile
August 07, 2023, 08:10:54 AM
Merited by BlackHatCoiner (4)
 #34

Yeah, it is designed to be censorship resistant, but its packets have some recognizable  patterns that allow to mark the relevant network traffic as to be originated from TOR app.
That's the whole point behind pluggable transports. They mask your Tor traffic as something else which prevents your ISP or government from identifying it as Tor traffic. As I mentioned above, obfs4 makes your data look totally random, while meek makes it look like you are browsing a clearnet website. Given that these work in many different jurisdictions to bypass many different types and methods of censorship, we know that they work.
ranochigo
Legendary
*
Offline Offline

Activity: 2954
Merit: 4165


View Profile
August 07, 2023, 08:15:08 AM
Merited by BlackHatCoiner (6)
 #35

Well, don't take offence, just  read:
None taken! Thanks for the references.
The paper is actually quite outdated and is only applicable in very specific scenarios:
1) For some reason, every single hidden service peer gets attacked and is unable to establish any connection to the target node. That is very, very resource intensive considering the fact that the number of nodes running on Tor outnumbers the ones on the clearnet.
2) The user uses an outdated version of Bitcoin Core, which is roughly around 7 years ago by my estimates. We have improved a lot to counter topological analysis since then and they work pretty well.
3) Section 3 basically talks about a sybil attack, which fails to deanonymize a user with sufficient accuracy if any of the peers other than those controlled by the attacker is connected to the target.
This is independent of the usage of Bitcoin Core. It has to do with the user's privacy habits which essentially means that you have to tell everyone that you're the owner of this specific address in your hidden service. Definitely not something that anyone with privacy in mind would do.
This doesn't demonstrate anything that is related to Bitcoin Core and Tor.
Portscanners would only work if your Bitcoin Core accepts incoming connections, and it also practically doesn't serve any use or deanonymize the user.

This doesn't really do anything.

However, it seems to me that you have missed the main reason why I against TOR for my node - I don't want to be blacklisted.

As mentioned above, Tor bridges can be used as well.

Haven't seen this for a while but generally whatever is said there can be easily debunk with a little research. Tons of affiliate links to VPNs on the site as well, go figure Cheesy.

https://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document

Yeah, it is designed to be censorship resistant, but its packets have some recognizable  patterns that allow to mark the relevant network traffic as to be originated from TOR app.
VPN connections are fairly recognizable as well, even with daisy-chaining. Arguably, VPNs are even easily identified and flagged with DPI, GFW has done this on numerous occasions.

Tor via VPN, yeah, it might be solution, but I'm not sure if they have power to strip off VPN packets (even XORed) that enveloped the relevant TOR ones and thus blacklist me.
If they can, then I believe VPN wouldn't be the best option either.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
ABCbits
Legendary
*
Offline Offline

Activity: 2856
Merit: 7430


Crypto Swap Exchange


View Profile
August 07, 2023, 08:55:59 AM
Merited by satscraper (1)
 #36

--snip--
I talk about Western countries in this case. We have that freedom, if you move your ass, you can protect your identity online. Western countries can block VPNs but they don't do it, they leave some room for those who want freedom and I think that's a clever strategy.
By the way, your country blacklists people because of Tor usage but you are a digital nomad, you can change things. You can move in countries like Armenia, Moldova, Georgia and you'll have a huge digital freedom. It's another task whether you'll enjoy life there.
Overall, in life, if you want to get something, you have to give something.

1. Not everyone live on country where it's government respect people's freedom.
2. Moving to another country is harder than it sounds.

Yeah, it is designed to be censorship resistant, but its packets have some recognizable  patterns that allow to mark the relevant network traffic as to be originated from TOR app.
TOR users are more interested in hiding their identity and masking their ip addresses than the fact that they are using TOR.

Unless they're high profile person or they live in authoritarian country.

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
Synchronice
Hero Member
*****
Offline Offline

Activity: 840
Merit: 772


Watch Bitcoin Documentary - https://t.ly/v0Nim


View Profile
August 07, 2023, 09:41:53 AM
 #37

1. Not everyone live on country where it's government respect people's freedom.
2. Moving to another country is harder than it sounds.
Basically, if you have money, you have freedom. Money really buys freedom. By the way, you have to do your own research when you decide to change country for the reasons what was written above, I am not going to suggest anything to anyone, I already wrote more than enough for some.

By the way, moving in another country can be hard for some, that's absolutely individual. After spending one-two months in foreign country, I feel like I'm at home, I adapt to things and culture very easily and everyday life of particular city very easily. But I agree with you, I have known people who were about to cry after living for one month in another country.

.freebitcoin.       ▄▄▄█▀▀██▄▄▄
   ▄▄██████▄▄█  █▀▀█▄▄
  ███  █▀▀███████▄▄██▀
   ▀▀▀██▄▄█  ████▀▀  ▄██
▄███▄▄  ▀▀▀▀▀▀▀  ▄▄██████
██▀▀█████▄     ▄██▀█ ▀▀██
██▄▄███▀▀██   ███▀ ▄▄  ▀█
███████▄▄███ ███▄▄ ▀▀▄  █
██▀▀████████ █████  █▀▄██
 █▄▄████████ █████   ███
  ▀████  ███ ████▄▄███▀
     ▀▀████   ████▀▀
BITCOIN
DICE
EVENT
BETTING
WIN A LAMBO !

.
            ▄▄▄▄▄▄▄▄▄▄███████████▄▄▄▄▄
▄▄▄▄▄██████████████████████████████████▄▄▄▄
▀██████████████████████████████████████████████▄▄▄
▄▄████▄█████▄████████████████████████████▄█████▄████▄▄
▀████████▀▀▀████████████████████████████████▀▀▀██████████▄
  ▀▀▀████▄▄▄███████████████████████████████▄▄▄██████████
       ▀█████▀  ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀  ▀█████▀▀▀▀▀▀▀▀▀▀
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.PLAY NOW.
un_rank
Hero Member
*****
Offline Offline

Activity: 700
Merit: 680


- Jay -


View Profile WWW
August 07, 2023, 12:01:48 PM
 #38

Unless they're high profile person or they live in authoritarian country.
These people are those who will be more interested in hiding their identity and ip address while running a node.
Is it possible you misunderstood my post you replied to?

- Jay -

██████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
██████████████████████
.SHUFFLE.COM..███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
█████████████████████
████████████████████
██████████████████████
████████████████████
██████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
██████████████████████
██████████████████████
██████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
.
...Next Generation Crypto Casino...
satscraper
Hero Member
*****
Offline Offline

Activity: 714
Merit: 1324


Cashback 15%


View Profile
August 07, 2023, 05:17:53 PM
 #39

Yeah, it is designed to be censorship resistant, but its packets have some recognizable  patterns that allow to mark the relevant network traffic as to be originated from TOR app.
That's the whole point behind pluggable transports. They mask your Tor traffic as something else which prevents your ISP or government from identifying it as Tor traffic. As I mentioned above, obfs4 makes your data look totally random, while meek makes it look like you are browsing a clearnet website.


As I have already mentioned, I"m aware of all techniques that can be used to obfuscate TOR traffic.

But, as the old saying goes "caution is the parent of safety".

https://www.wired.co.uk/article/nsa-targeting-tor-users
https://www.digitaltrends.com/computing/nsa-labels-linux-tails-users-extremists/

 A while back Snowden has denounced the NSA power to track TOR traffic.

Go to NSA official page  and enter TOR into the search field. Even in open docs you  may find many teaser stuff.  


Given that these work in many different jurisdictions to bypass many different types and methods of censorship, we know that they work.


Many - YES. All - NO.




I'm aware why you all  are so persistent in convincing me about TOR. The more users use it the harder work for surveillance agencies.

But,    count me out,    count me out,    count me out!   

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
Knight Hider
Member
**
Offline Offline

Activity: 239
Merit: 59

a young loner on a crusade


View Profile
August 07, 2023, 08:55:48 PM
 #40

1. Not everyone live on country where it's government respect people's freedom.
2. Moving to another country is harder than it sounds.
Basically, if you have money, you have freedom. Money really buys freedom.
Having enough money to buy your freedom legally is out of reach for most people. I believe anonymous money on the other hand can buy (some) freedom at much lower cost.

--Knight Hider

in a world of criminals who operate above the law
one man can make a difference and you are going to be that man
Pages: « 1 [2] 3 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!