Bitcoin Forum
May 06, 2024, 06:07:27 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: 1 2 3 [All]
  Print  
Author Topic: Let's talk about security  (Read 500 times)
BernyJB (OP)
Full Member
***
Offline Offline

Activity: 168
Merit: 190


View Profile
November 04, 2021, 03:19:34 PM
Merited by Welsh (6), o_e_l_e_o (4), Symmetrick (3), JayJuanGee (1), ABCbits (1), Pmalek (1), Heisenberg_Hunter (1)
 #1

I tried to post this on the "Serious Discussion" board, as it doesn't necessarily pertains to Bitcoin, but couldn't do it. Sorry.  Embarrassed

So, as I stated before, I've been doing a lot of research, while getting ready to start investing. Not surprisingly, I learned that there are a lot of criminals preying on crypto investors.
Now, money is (courtesy of, among other things, the damn pandemic), very tight. I've been looking at ways that may be within my means (or lack thereof) to make my investments as secure as possible.
So far, I'm looking at using 3 operating systems (Fedora Linux for my main activity online, most likely with Tor, Windows 8.1 inside a virtual machine for information and monitoring purposes only, and Tails with Tor for coin cold storage).
My question would be, initially, about VPN's.

Would using Tor over a VPN be a good idea for crypto trading? I understand (to a point) the advantages of such a setup, but would it provide any real advantages in this case? Is it worth the extra expense?
I know Linux is generally (not 100%) immune to malware, but I'm particularly worried about phishing and keyloggers. In the meantime, I have installed ClamAV already, and I'm keeping as secure as I can. Am I overthinking it?
1714975647
Hero Member
*
Offline Offline

Posts: 1714975647

View Profile Personal Message (Offline)

Ignore
1714975647
Reply with quote  #2

1714975647
Report to moderator
1714975647
Hero Member
*
Offline Offline

Posts: 1714975647

View Profile Personal Message (Offline)

Ignore
1714975647
Reply with quote  #2

1714975647
Report to moderator
1714975647
Hero Member
*
Offline Offline

Posts: 1714975647

View Profile Personal Message (Offline)

Ignore
1714975647
Reply with quote  #2

1714975647
Report to moderator
There are several different types of Bitcoin clients. The most secure are full nodes like Bitcoin Core, but full nodes are more resource-heavy, and they must do a lengthy initial syncing process. As a result, lightweight clients with somewhat less security are commonly used.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714975647
Hero Member
*
Offline Offline

Posts: 1714975647

View Profile Personal Message (Offline)

Ignore
1714975647
Reply with quote  #2

1714975647
Report to moderator
1714975647
Hero Member
*
Offline Offline

Posts: 1714975647

View Profile Personal Message (Offline)

Ignore
1714975647
Reply with quote  #2

1714975647
Report to moderator
1714975647
Hero Member
*
Offline Offline

Posts: 1714975647

View Profile Personal Message (Offline)

Ignore
1714975647
Reply with quote  #2

1714975647
Report to moderator
BlackHatCoiner
Legendary
*
Offline Offline

Activity: 1512
Merit: 7351


Farewell, Leo


View Profile
November 04, 2021, 03:26:23 PM
 #2

I learned that there are a lot of criminals preying on crypto investors.
Yes, but with you don't achieve much by just enhancing your privacy. For instance, don't you also give KYC to the crypto platform?

Would using Tor over a VPN be a good idea for crypto trading?
It's generally not a good idea to route traffic through a VPN if you're already using Tor.

Can I use a VPN with Tor?
Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy.

You can find more detailed information about Tor + VPN at our wiki

Is there a specific reason you want to do that? Has your crypto trading platform blacklisted Tor's exit nodes?

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
BernyJB (OP)
Full Member
***
Offline Offline

Activity: 168
Merit: 190


View Profile
November 04, 2021, 04:01:24 PM
 #3

I learned that there are a lot of criminals preying on crypto investors.
Yes, but with you don't achieve much by just enhancing your privacy. For instance, don't you also give KYC to the crypto platform?

Would using Tor over a VPN be a good idea for crypto trading?
It's generally not a good idea to route traffic through a VPN if you're already using Tor.

Can I use a VPN with Tor?
Generally speaking, we don't recommend using a VPN with Tor unless you're an advanced user who knows how to configure both in a way that doesn't compromise your privacy.

You can find more detailed information about Tor + VPN at our wiki

Is there a specific reason you want to do that? Has your crypto trading platform blacklisted Tor's exit nodes?

I haven't started yet, just brainstorming. I read a whole lot of articles citing advantages to using Tor over a VPN (as opposed to using a VPN over Tor, which is said to be harder to implement and not as effective), so it occurred to me that could be a good way to protect your private keys when you need to use them, but I wanted to know your opinions first.
sheenshane
Legendary
*
Offline Offline

Activity: 2394
Merit: 1215


Cashback 15%


View Profile WWW
November 04, 2021, 04:07:04 PM
 #4

Would using Tor over a VPN be a good idea for crypto trading? I understand (to a point) the advantages of such a setup, but would it provide any real advantages in this case? Is it worth the extra expense?
The above idea was right and I tend to agree that using Tor over VPN is too much safer, you can use Tor alone or even PVN alone and yes, it seems it is an additional expense.  If you have an extra budget that might be good because AFAIK, there are some ISPs that block the Tor Network from accessing it and it will always depend on your network provider which is allowed to use Tor.  The only way that you can access Tor is to use VPN, in that way, you can completely mask your identities such as IP address or any footprints that you are using crypto for the financial transaction which hackers can trace your transactions.

IMO, decentralized exchange plus using non-custodial crypto wallets are complete can hide your identity, yet we can't possibly hide anonymously but possible can be pseudonymous.

Quote
Am I overthinking it?
Lol, yes you are.  It's all about how you will use it.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
NeuroticFish
Legendary
*
Offline Offline

Activity: 3668
Merit: 6379


Looking for campaign manager? Contact icopress!


View Profile
November 04, 2021, 04:37:29 PM
Merited by ABCbits (1)
 #5

Would using Tor over a VPN be a good idea for crypto trading?

I have a feeling that if you do trading on centralized exchanges with such a setup, sooner or later some may ask you for extensive KYC and such.
At least for VPN, there was this topic just 2 weeks ago: Is it safe to use Binance on VPN

Imho you're overthinking it.
A safe OS is good, hardware wallet is better, using hardware device for 2FA (some of the hardware wallets can do that too) is even better (although I didn't try this yet myself). If you want to be safe, these are some of the checkpoints. Also plausible deniability may be important too, see Necessary reminder: watch out for $5 wrench attacks

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
BernyJB (OP)
Full Member
***
Offline Offline

Activity: 168
Merit: 190


View Profile
November 04, 2021, 05:10:20 PM
 #6

Thank you all.
Law enforcement in my country is kinda "loose", to put it very mildly (it's a lawless sh1thole, to be honest). that's why I want to be as safe as I can before I mess up. I agree what's important is what people think you have, so I usually don't share my successes (especially when it's about money), which is the reason I want to keep my transactions anonymous if at all possible. Way too many prying eyes...
I also read plenty of horror stories about people getting targeted for using hardware wallets (especially the Ledger), and either way hardware wallets are absolutely unaffordable to me right now, which is why I decided on using Tails on a thumbdrive. Definitely cheaper (I already have the drive), and safe, as long as you don't connect to the internet.
NotATether
Legendary
*
Offline Offline

Activity: 1596
Merit: 6728


bitcoincleanup.com / bitmixlist.org


View Profile WWW
November 04, 2021, 05:40:10 PM
 #7

I also read plenty of horror stories about people getting targeted for using hardware wallets (especially the Ledger), and either way hardware wallets are absolutely unaffordable to me right now, which is why I decided on using Tails on a thumbdrive. Definitely cheaper (I already have the drive), and safe, as long as you don't connect to the internet.

My friend told me that Ledger corporates with law enforcement (which countries? I haven't got a clue.) to seize crypto in their hardware wallets. Does your paranoia have anything to do with that?

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
BernyJB (OP)
Full Member
***
Offline Offline

Activity: 168
Merit: 190


View Profile
November 04, 2021, 06:32:23 PM
 #8

I also read plenty of horror stories about people getting targeted for using hardware wallets (especially the Ledger), and either way hardware wallets are absolutely unaffordable to me right now, which is why I decided on using Tails on a thumbdrive. Definitely cheaper (I already have the drive), and safe, as long as you don't connect to the internet.

My friend told me that Ledger corporates with law enforcement (which countries? I haven't got a clue.) to seize crypto in their hardware wallets. Does your paranoia have anything to do with that?

Not really. I read many emails on the ledger site (examples of emails users have been getting) from several kinds of criminals (scammers, extortionists, etc). Now, it's not like they're gonna scare me into giving them a single penny, but if I can avoid the issue, I will. Especially if I save money in the process.
larry_vw_1955
Sr. Member
****
Offline Offline

Activity: 1050
Merit: 357


View Profile
November 05, 2021, 07:47:11 AM
 #9



My friend told me that Ledger corporates with law enforcement (which countries? I haven't got a clue.) to seize crypto in their hardware wallets. Does your paranoia have anything to do with that?

anytime you go through some service provider, assume they log your ip address and any other identifying information like your bitcoin addresses and transactions that way if the government or law enforcement or taxing authority wants it they will give it to them. they all do that. without an exception. that's a safe assumption.

they might not be able to hack your actual seed phrase unless the wallet has a backdoor but they dont need to do that. they being the powers that be.

to be really safe one has to use monero. but that's another story i suppose. and not everyone wants to have to do that. oh and even then at the end of the day, in places like the usa, when it comes to tax evasion issues, one is presumed guilty and has to prove their innocence  Huh that's quite a pickle to be in let me tell you.
n0nce
Hero Member
*****
Offline Offline

Activity: 882
Merit: 5818


not your keys, not your coins!


View Profile WWW
November 05, 2021, 12:35:34 PM
Merited by Welsh (8), JayJuanGee (2), ABCbits (2)
 #10

I haven't started yet, just brainstorming. I read a whole lot of articles citing advantages to using Tor over a VPN (as opposed to using a VPN over Tor, which is said to be harder to implement and not as effective), so it occurred to me that could be a good way to protect your private keys when you need to use them, but I wanted to know your opinions first.
If your main goal is to protect the private keys; just keep them on a device that is simply never (really, never never) connected to a network. It can be a computer booted off a Tails Linux USB drive, but also a hardware wallet. You can trade even on a phone if you wanted; just make sure to withdraw funds to a machine / device that is fully offline, then you're good.

Privacy is another thing. But the topic is security; and there it's simplest and safest to have a dedicated device for holding your keys. No matter how paranoid you are, how many blockers, antiviruses, VPNs, etc. that you install; a dedicated device will be better.

If you want to go max level; ditch the 'device' entirely, and generate a secure offline 'paper' wallet using an offline machine and dice rolls & stamp the seed phrase into a piece of steel as well. It's easiest to protect private keys if they never leave the physical 'offline' world Smiley



On the word of privacy; if you look up your balance via normal blockchain explorers and SPV wallets, the provider of that site can and will link & save your IP address and the Bitcoin address you looked up. There are multiple ways to avoid this and it may deserve its own topic. I personally, since a long time, either look up addresses over the Tor version of blockchain explorers, or just use my own Bitcoin node.
http://mempoolhqx4isw62xs7abwphsq7ldayuidyx2v2oethdhhj6mlo2r6ad.onion/
http://blkchairbknpn73cfjhevhla7rkp4ed5gg2knctvv7it4lioy22defid.onion/bitcoin/



For steel seed backup on a budget (e.g. if your USB drive breaks), I would recommend stamping or engraving any cheap piece of steel that you can find. You don't need the products made 'for Bitcoin' since they're often almost as expensive as a hardware wallet which you mentioned you can't afford right now. (though Trezor One is just around 50-60 bucks.... https://shop.trezor.io/product/trezor-one-white)

This is how I like to do steel backups nowadays: https://bitcointalk.org/index.php?topic=5363596.0

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
Pmalek
Legendary
*
Offline Offline

Activity: 2758
Merit: 7132



View Profile
November 05, 2021, 01:22:28 PM
 #11

but I'm particularly worried about phishing and keyloggers.
This might sound stupid and generic, but don't get phished or keylogged. Pay attention to the sites you are visiting and only download and install the most basic software that you need from the official sources. Don't click on unknown links, don't open emails and attachments from people you don't know, don't torrent, watch porn, and play with patches and cracks and illegal software on a PC you use for your financials. Doesn't matter if it's crypto or fiat-related. Verify and double-check everything you can.   

I personally, since a long time, either look up addresses over the Tor version of blockchain explorers, or just use my own Bitcoin node.
Why do you think using the TOR version is safer? Couldn't that be a great honeypot as well? Someone creates a TOR-only blockchain explorer that logs addresses. Your IP is protected, that's true. Unless the TOR server you are connected to is also malicious.

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
Charles-Tim
Legendary
*
Offline Offline

Activity: 1540
Merit: 4845



View Profile
November 05, 2021, 02:43:48 PM
 #12

Would using Tor over a VPN be a good idea for crypto trading?
What kind of trading? On centralized exchanges and wallets, not advisable, some even block any VPN or Tor and only allow IP address from service providers to be able to make use of their exchange. On decentralized exchange, VPN is enough while only Tor can maximize the anonymity.

I know Linux is generally (not 100%) immune to malware
Pmalek has given you enough answers to that just to avoid repetition. Also you can have anti malware and frequently updating it, making use of ads blocker like Ublock in addition. If you avoid malware, your device will not be infected. About keyloggers, even bitcoin address will change to hackers address either when you copy and want to paste and send the address to a sender (someone that want to send you bitcoin) or while about to send to a receiver, checking and rechecking the address before sending can help and bring your notice to it, but avoiding malware generally will make this not even possible.

But the topic is security; and there it's simplest and safest to have a dedicated device for holding your keys.
Why don't he just hold the seed phrase instead of the keys when we are no more in the nondeterministic (random) wallets era and now in deterministic (seeded) wallets era. This can still make this simple by backing up the seed phrase (which can generate the keys and addresses), the seed phrase can easily be backup on laminated paper or on metallic sheet.

Why do you think using the TOR version is safer? Couldn't that be a great honeypot as well? Someone creates a TOR-only blockchain explorer that logs addresses. Your IP is protected, that's true. Unless the TOR server you are connected to is also malicious.
There is nothing better than runing own node and have the privacy we need, but due to high ever growing bytes (over 430 gigabytes now) required to download the full blockchain to run full node or the discouraging aspect of a pruned node, some people do not just have option than to make use of the SPV wallets, while still just try all possible means to have privacy, but the way to have privacy starts from running own full node.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
BlackHatCoiner
Legendary
*
Offline Offline

Activity: 1512
Merit: 7351


Farewell, Leo


View Profile
November 05, 2021, 03:10:55 PM
 #13

I know n0nce knows this, but it goes to Berny.

On the word of privacy; if you look up your balance via normal blockchain explorers and SPV wallets, the provider of that site can and will link & save your IP address and the Bitcoin address you looked up. There are multiple ways to avoid this and it may deserve its own topic. I personally, since a long time, either look up addresses over the Tor version of blockchain explorers, or just use my own Bitcoin node.
If you look up the balance of your addresses in clearnet, your IP can be traced and make yourself neither private nor anonymous. Visiting the block explorers from Tor won't work either, because the receiver (onion service) will query for different addresses, but from the same sender which can then link them. If you want to protect your privacy you'll have to change your relay circuit every time.

Or a much more private and easy way: Run a node.

Unless the TOR server you are connected to is also malicious.
For what Tor server are you talking about?

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
Charles-Tim
Legendary
*
Offline Offline

Activity: 1540
Merit: 4845



View Profile
November 05, 2021, 03:41:25 PM
 #14

If you want to protect your privacy you'll have to change your relay circuit every time.
Yeah, this is correct but this also goes to while using SPV wallets. Having seperate wallets and changing the relay circuit each time for central server not to link addresses of seperate wallets together.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
BernyJB (OP)
Full Member
***
Offline Offline

Activity: 168
Merit: 190


View Profile
November 05, 2021, 04:56:16 PM
 #15

As usual, you guys are very informative. Thanks to all. Smiley

larry_vw_1955: I'm not really worried about the tax collectors. One of the (very few) good things about living in a lawless country is you don't really have any obligation to pay taxes, and nobody can do anything to you if you don't. The downside is you have to fend for yourself, because the police is just as non-existent as the tax agency.

The reason I'm worried about security is twofold: first, Argentinian hackers are said to be among the best (not surprisingly, considering Argentinians generally have  penchant for doing damage), and second, if you do get hurt (physically or financially or whatever), nobody protects you, you're screwed. The law here is so twisted that if you defend yourself, you go to prison.

ETFbitcoin: I'm setting up to use Binance. Might I have any problems if I use my wallet (I'm intending to use Tails on a pendrive with persistent storage and Coinomi) through Tor with them?
And yes, I am using 2FA authentication.

n0nce: yeah, I'm already setting Tails up, and I intend to never connect it to the internet. I am loving your steel idea though. Stainless steel. that would be one helluva way to store your seeds.  Cool

Typically, if "something" costs USD 50 in the US, it costs about USD 300 to 400 here. To give you an idea, a few years ago I bought a gun. Made in Argentina. I could literally take a bus and be at the factory's doors in less than 40 minutes. That gun doesn't exist in the US, but a similar one (same brand) is about $300. I paid $850 for mine, on sale.

Pmalek: yeah, I'm already doing all that. just thought it'd be nice to add an extra layer  of security, just in case. in the (hopefully near) future I intend to have a dedicated computer for trading, and connect exclusively through Ethernet, but for now I have to use public wi-fi at a Starbucks store, so I'm getting very paranoid on that, especially since Starbucks has already had some "issues" with their network getting hacked in the past.

Charles-Tim: so, no Tor and no VPN. Got it. Thank you.

BlackHatCoiner: that's way over my head already. Guess I have some serious reading to do...

Again, thank you all for the replies.  Smiley
BlackHatCoiner
Legendary
*
Offline Offline

Activity: 1512
Merit: 7351


Farewell, Leo


View Profile
November 05, 2021, 05:34:34 PM
 #16

The reason I'm worried about security is twofold
What you actually worry is your privacy. If you are somehow found to use bitcoin, you may get robbed and thus, be unsecured. But, you should be aware of how to protect your privacy so that you'll remain secure.

first, Argentinian hackers are said to be among the best (not surprisingly, considering Argentinians generally have  penchant for doing damage)
This sounds a bit stereotypical, no offense.

The law here is so twisted that if you defend yourself, you go to prison.
So what you want is to never happen to be in a case where you have to defend yourself. The above recommendations are fine to hide your identity. It depends, though, on how you'll buy and use those cryptocurrencies. For instance, if you use a bank to make the transaction, then your state can know it. Your options are generally limited. Retaining privacy in 2021 is a headache.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
mindrust
Legendary
*
Offline Offline

Activity: 3248
Merit: 2425



View Profile WWW
November 05, 2021, 06:23:26 PM
 #17

I tried to post this on the "Serious Discussion" board, as it doesn't necessarily pertains to Bitcoin, but couldn't do it. Sorry.  Embarrassed

So, as I stated before, I've been doing a lot of research, while getting ready to start investing. Not surprisingly, I learned that there are a lot of criminals preying on crypto investors.
Now, money is (courtesy of, among other things, the damn pandemic), very tight. I've been looking at ways that may be within my means (or lack thereof) to make my investments as secure as possible.
So far, I'm looking at using 3 operating systems (Fedora Linux for my main activity online, most likely with Tor, Windows 8.1 inside a virtual machine for information and monitoring purposes only, and Tails with Tor for coin cold storage).
My question would be, initially, about VPN's.

Would using Tor over a VPN be a good idea for crypto trading? I understand (to a point) the advantages of such a setup, but would it provide any real advantages in this case? Is it worth the extra expense?
I know Linux is generally (not 100%) immune to malware, but I'm particularly worried about phishing and keyloggers. In the meantime, I have installed ClamAV already, and I'm keeping as secure as I can. Am I overthinking it?

No need to get paranoid about it unless you do some shady stuff.

It is also impossible to be 100% secure/anonymous. The moment you connect to the internet, your ISP knows that you are connected. You are already visible to them.

I only use linux and an adblocker and It works well so far. Dump windows right away, using windows is the single biggest mistake you can make. It is not open source so can't really know what data Uncle Bill is tracking and collecting from you. (on the top of that, you drive him fucking crazy by using linux and you can't name a price for having that kind of fun)

VPN's are crap too. If they go to NordVPN with an FBI warrant, I am pretty fucking sure they'll give them your data on a silver plate.

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
BernyJB (OP)
Full Member
***
Offline Offline

Activity: 168
Merit: 190


View Profile
November 05, 2021, 07:18:49 PM
 #18

What you actually worry is your privacy. If you are somehow found to use bitcoin, you may get robbed and thus, be unsecured. But, you should be aware of how to protect your privacy so that you'll remain secure.

What I worry about is getting caught with my pants down if I can help it. If a guy tries to mug me on the street, I can defend myself (one did just that a few months ago. He couldn't), but if a guy robs me through my computer I'm helpless. I don't like the feeling.

first, Argentinian hackers are said to be among the best (not surprisingly, considering Argentinians generally have  penchant for doing damage)
This sounds a bit stereotypical, no offense.

None taken. Grin Grin
I don't belong to that "group", so I can only go by what I read or hear.  Huh

The law here is so twisted that if you defend yourself, you go to prison.
So what you want is to never happen to be in a case where you have to defend yourself. The above recommendations are fine to hide your identity. It depends, though, on how you'll buy and use those cryptocurrencies. For instance, if you use a bank to make the transaction, then your state can know it. Your options are generally limited. Retaining privacy in 2021 is a headache.

I just want to be in a case when if I have to defend myself, I can do it. Right now, I can't.



No need to get paranoid about it unless you do some shady stuff.

I don't do shady stuff, but others do. I'm trying to make sure (best I can) they don't do it to me.

It is also impossible to be 100% secure/anonymous. The moment you connect to the internet, your ISP knows that you are connected. You are already visible to them.

No such thing as impossible. Tor obfuscates your identity, to the point even US 3-letter agencies have been unable to crack it.

I only use linux and an adblocker and It works well so far. Dump windows right away, using windows is the single biggest mistake you can make. It is not open source so can't really know what data Uncle Bill is tracking and collecting from you. (on the top of that, you drive him fucking crazy by using linux and you can't name a price for having that kind of fun)

Oh, hell YEAH!!!  Grin Grin Grin
Been using Linux since 2009. Best decision I ever made.
duck-duck go and adblock plus are second and third best. Cool

VPN's are crap too. If they go to NordVPN with an FBI warrant, I am pretty fucking sure they'll give them your data on a silver plate.

I don't live under US law, so if the FBI wants my data, they can ask me, no problem.
BlackHatCoiner
Legendary
*
Offline Offline

Activity: 1512
Merit: 7351


Farewell, Leo


View Profile
November 05, 2021, 07:26:12 PM
 #19

but if a guy robs me through my computer I'm helpless. I don't like the feeling.
He'd rob you if he ever found out you own cryptocurrencies. If he didn't, you wouldn't be his prey. So, it's a matter of privacy.

I don't belong to that "group", so I can only go by what I read or hear.
That's why I said it's stereotypical. There's no evidence that Argentina has the greatest hackers in sum neither that the Argentines are used to make damage. Just stereotypes.

No such thing as impossible. Tor obfuscates your identity, to the point even US 3-letter agencies have been unable to crack it.
So why did you want to add another “layer” of privacy protection (VPN) in front of it? You said it yourself; Tor obfuscates your identity to a high degree.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
Charles-Tim
Legendary
*
Offline Offline

Activity: 1540
Merit: 4845



View Profile
November 05, 2021, 07:27:51 PM
 #20

It is also impossible to be 100% secure/anonymous. The moment you connect to the internet, your ISP knows that you are connected. You are already visible to them.
Yes you are right, but you can be 100% secure if you want to, but someone can not be 100% private and anonymous, but the certain aspect to keep private can still be kept private but this require knowledge and experience.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
BernyJB (OP)
Full Member
***
Offline Offline

Activity: 168
Merit: 190


View Profile
November 05, 2021, 07:42:05 PM
 #21

but if a guy robs me through my computer I'm helpless. I don't like the feeling.
He'd rob you if he ever found out you own cryptocurrencies. If he didn't, you wouldn't be his prey. So, it's a matter of privacy.

Semantics.
If he knew I had all the cryptocurrencies in the world and couldn't touch me, he wouldn't, and the knowledge would be useless to him.

I don't belong to that "group", so I can only go by what I read or hear.
That's why I said it's stereotypical. There's no evidence that Argentina has the greatest hackers in sum neither that the Argentines are used to make damage. Just stereotypes.

I'm Argentinian, currently living in Buenos Aires. I never said Argentinian hackers are the greatest, I said they're considered to be among the best.
About doing damage, trust me, they're nasty. I can't possibly give you a marginally accurate picture of what living in here means. Let's just say I'd rather be anywhere else.

No such thing as impossible. Tor obfuscates your identity, to the point even US 3-letter agencies have been unable to crack it.
So why did you want to add another “layer” of privacy protection (VPN) in front of it? You said it yourself; Tor obfuscates your identity to a high degree.

For what I read (again, remember I'm far from an expert), Tor obfuscates your entry point to the network, but the exit node can still be used to track you. Adding a VPN is said to close the circle.
mindrust
Legendary
*
Offline Offline

Activity: 3248
Merit: 2425



View Profile WWW
November 05, 2021, 08:09:07 PM
 #22

I don't live under US law, so if the FBI wants my data, they can ask me, no problem.

^Here is the big illusion...

Everybody lives under the US law.

Everybody.

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
BernyJB (OP)
Full Member
***
Offline Offline

Activity: 168
Merit: 190


View Profile
November 05, 2021, 08:14:46 PM
 #23

I don't live under US law, so if the FBI wants my data, they can ask me, no problem.

^Here is the big illusion...

Everybody lives under the US law.

Everybody.

Heh. That's what Americans think.
larry_vw_1955
Sr. Member
****
Offline Offline

Activity: 1050
Merit: 357


View Profile
November 06, 2021, 02:36:12 AM
 #24

As usual, you guys are very informative. Thanks to all. Smiley

larry_vw_1955: I'm not really worried about the tax collectors. One of the (very few) good things about living in a lawless country is you don't really have any obligation to pay taxes, and nobody can do anything to you if you don't. The downside is you have to fend for yourself, because the police is just as non-existent as the tax agency.

The reason I'm worried about security is twofold: first, Argentinian hackers are said to be among the best (not surprisingly, considering Argentinians generally have  penchant for doing damage), and second, if you do get hurt (physically or financially or whatever), nobody protects you, you're screwed. The law here is so twisted that if you defend yourself, you go to prison.


If the police are non-existent then how could you go to prison that's kind of confusing. or maybe you're saying the police only show up when you don't need them. i could understand that maybe. Grin
n0nce
Hero Member
*****
Offline Offline

Activity: 882
Merit: 5818


not your keys, not your coins!


View Profile WWW
November 06, 2021, 03:56:28 AM
Last edit: November 06, 2021, 04:07:08 AM by n0nce
Merited by JayJuanGee (1), ABCbits (1)
 #25

I personally, since a long time, either look up addresses over the Tor version of blockchain explorers, or just use my own Bitcoin node.
Why do you think using the TOR version is safer? Couldn't that be a great honeypot as well? Someone creates a TOR-only blockchain explorer that logs addresses. Your IP is protected, that's true. Unless the TOR server you are connected to is also malicious.
Well, when I use Tor Browser and use the Tor version of the website, it won't see my home IP. The Tor blockchain explorer can log anything it wants; they won't see my home IP address and also every time I restart Tor Browser or open a new tab, I have a new Tor IP as well (at least when restarting). An attacker would need access to lots of Tor nodes to map my identity to the query on the website.

It's not as good as just asking your own home node locally, but if you don't have one, it's better than clearnet https://blockchair.com/ for example.

But the topic is security; and there it's simplest and safest to have a dedicated device for holding your keys.
Why don't he just hold the seed phrase instead of the keys when we are no more in the nondeterministic (random) wallets era and now in deterministic (seeded) wallets era. This can still make this simple by backing up the seed phrase (which can generate the keys and addresses), the seed phrase can easily be backup on laminated paper or on metallic sheet.
Sorry, I always mean seed words when I say 'keys'! Smiley Of course it's not technically correct anymore and it's definitely better (in most cases) to save the seed words instead, since we can derive many many private keys and addresses from one such seed.

If you want to protect your privacy you'll have to change your relay circuit every time.
I'm sorry, I was way too unspecific. When I can't access a node of mine to query my balances and transactions, I start up Tor Browser and use a Tor block explorer. Tor Browser gives me a new relay circuit every time indeed; and as said above, it's hard to trace the query back to myself due to Onion routing (it's in the name! Grin) as well.

I'm setting up to use Binance.
You might want to check out a decentralized, KYC-free, open-source exchange that runs completely over Tor by default, by the way.. not sure it has enough liquidity in your country, though. https://bisq.network/

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
Pmalek
Legendary
*
Offline Offline

Activity: 2758
Merit: 7132



View Profile
November 06, 2021, 07:32:59 AM
 #26

For what Tor server are you talking about?
Not a particular one. I am just assuming that in the same way that a three-letter agency can set up and run their own Electrum servers, they might be able to set up and run their own TOR routers to examine the traffic that runs through them and take a closer look at those individuals that might be of interest to them.

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
mindrust
Legendary
*
Offline Offline

Activity: 3248
Merit: 2425



View Profile WWW
November 06, 2021, 08:06:38 AM
 #27

I don't live under US law, so if the FBI wants my data, they can ask me, no problem.

^Here is the big illusion...

Everybody lives under the US law.

Everybody.

Heh. That's what Americans think.

I am not American though.

I've seen what they did to McAfee. His crime was avoiding his taxes. He got pwned in Spain. Died in a cell. I've never heard of a German guy that avoided his taxes getting pwned in the US by the German officers.

There were other examples too. Another one was the owner of btc-e. He got pwned in Greece... by the FEDs. How is that possible?

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
Pmalek
Legendary
*
Offline Offline

Activity: 2758
Merit: 7132



View Profile
November 06, 2021, 08:15:52 AM
 #28

I've seen what they did to McAfee. His crime was avoiding his taxes. He got pwned in Spain. Died in a cell.
...
There were other examples too. Another one was the owner of btc-e. He got pwned in Greece... by the FEDs. How is that possible?
I don't know who the other guy you mentioned is, but McAfee was certainly a much bigger player than OP is. The person that "had an accident" in Greece was of a similar caliber probably. McAfee kept running his mouth against the government, kept criticizing. Wasn't there a time when he was considering running for president and he promised to make crypto an integral part of his campaign? He was a very controversial character indeed.   

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
BlackHatCoiner
Legendary
*
Offline Offline

Activity: 1512
Merit: 7351


Farewell, Leo


View Profile
November 06, 2021, 12:21:15 PM
Merited by Pmalek (2), n0nce (2), ABCbits (1)
 #29

For what I read (again, remember I'm far from an expert), Tor obfuscates your entry point to the network, but the exit node can still be used to track you. Adding a VPN is said to close the circle.
The exit node can't track you if you're connecting to an onion service. The exit node can only read the message if you're connecting to a .com, .org, .net etc. (clearnet) which can then be used to track you.

Not a particular one. I am just assuming that in the same way that a three-letter agency can set up and run their own Electrum servers, they might be able to set up and run their own TOR routers to examine the traffic that runs through them and take a closer look at those individuals that might be of interest to them.
But, they can't read the message if it's an onion service. Yeah, they may know you're using Tor and that you're also visiting a block explorer, but they can't know what you're viewing. This is only known by the one who runs the onion service. So, unless every Tor node is a honeypot AND the block explorer is ran by surveillance agencies, you're fine.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
o_e_l_e_o
In memoriam
Legendary
*
Offline Offline

Activity: 2268
Merit: 18510


View Profile
November 06, 2021, 01:11:14 PM
Merited by Pmalek (2), n0nce (2), JayJuanGee (1), ABCbits (1)
 #30

For what I read (again, remember I'm far from an expert), Tor obfuscates your entry point to the network, but the exit node can still be used to track you. Adding a VPN is said to close the circle.
Tor obfuscates your entry and exit point to the network. Your exit node can only track you if they are also controlling your entry node and can link your entry and exit traffic between the two nodes, effectively mounting a Sybil attack.

If this is a concern of yours, then you could consider connecting to your VPN first, and then connecting from your VPN to Tor, effectively using your VPN server as an entry node in to the Tor network. If your Tor nodes are malicious, then they could only track you back to your VPN server, and not to your real IP address.

You should never connect to Tor first and then to your VPN, since that defeats the entire point of using Tor. All your anonymized traffic which has been passed through various Tor nodes and circuits would then all pass through a single VPN server and therefore all be linked back together.
COBRAS
Member
**
Offline Offline

Activity: 847
Merit: 22

$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk


View Profile
November 07, 2021, 01:47:21 AM
 #31

Without tor your ip adress then making trasactions is saved to blockchain, so if you for ex from Japan, then your wallet.dat password probably in Japan language too.... etc...

$$$ P2P NETWORK FOR BTC WALLET.DAT BRUTE F ORCE .JOIN NOW=GET MANY COINS NOW !!!
https://github.com/phrutis/LostWallet  https://t.me/+2niP9bQ8uu43MDg6
Pmalek
Legendary
*
Offline Offline

Activity: 2758
Merit: 7132



View Profile
November 07, 2021, 07:57:05 AM
Merited by o_e_l_e_o (4), BlackHatCoiner (2), ABCbits (1)
 #32

But, they can't read the message if it's an onion service. Yeah, they may know you're using Tor and that you're also visiting a block explorer, but they can't know what you're viewing. This is only known by the one who runs the onion service. So, unless every Tor node is a honeypot AND the block explorer is ran by surveillance agencies, you're fine.
Every TOR node doesn't need to be, but a few of them could. They could also be getting data from certain block explorers who would gladly sell it to them or hand it over for free depending on their agreement.

Tor obfuscates your entry and exit point to the network. Your exit node can only track you if they are also controlling your entry node and can link your entry and exit traffic between the two nodes, effectively mounting a Sybil attack.
Is this a risk worth thinking about? How many entry and exit node combinations exist on the TOR network? Do the numbers change and increase regularly or are they more or less the same for years?

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
ABCbits
Legendary
*
Offline Offline

Activity: 2870
Merit: 7464


Crypto Swap Exchange


View Profile
November 07, 2021, 10:52:42 AM
Merited by o_e_l_e_o (4), Pmalek (2), Husna QA (1)
 #33

Without tor your ip adress then making trasactions is saved to blockchain

1. The IP address isn't stored on blockchain, unless you meant blockchain.com the block explorer?
2. IP address shown by blockchain.com is IP of the node which relay the transaction to blockchain.com node. It's unlikely the sender run full node and directly connected to blockchain.com node.

Tor obfuscates your entry and exit point to the network. Your exit node can only track you if they are also controlling your entry node and can link your entry and exit traffic between the two nodes, effectively mounting a Sybil attack.
Is this a risk worth thinking about? How many entry and exit node combinations exist on the TOR network? Do the numbers change and increase regularly or are they more or less the same for years?

Read this (https://tor.stackexchange.com/a/114) and make your own conclusion. As for me, i would worry about something else.

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
Pmalek
Legendary
*
Offline Offline

Activity: 2758
Merit: 7132



View Profile
November 07, 2021, 11:18:33 AM
Merited by ABCbits (2), Husna QA (1)
 #34

Read this (https://tor.stackexchange.com/a/114) and make your own conclusion. As for me, i would worry about something else.
Good source, thank you.

I did find some parts in that discussion quite interesting. For example, here is a quote from one of the replies:
Quote
Some exit relays are considered as bad exits. They might listen in your traffic, change your traffic etc. Tor does not choose them (as long as you don't explicitly allow it).
How would TOR know that some exit nodes are "bad" and have ways to monitor or manipulate the traffic routed through them? And if they have such knowledge, why are those nodes not removed and blacklisted?

I find this segment interesting as well:
Quote
Operators who run more than one relay should declare those relays their 'family' (There is a special option in the configuration). Tor doesn't choose more then one relay from a family.
The emphasis is on "should". They didn't say "must" or "have to", but you have the option to do it or not.

Nothing of the above seems worrying to me either, but still interesting to think about... 

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
o_e_l_e_o
In memoriam
Legendary
*
Offline Offline

Activity: 2268
Merit: 18510


View Profile
November 07, 2021, 01:51:55 PM
Merited by ABCbits (2), Pmalek (2)
 #35

How many entry and exit node combinations exist on the TOR network? Do the numbers change and increase regularly or are they more or less the same for years?
You can take a look at the data here: https://metrics.torproject.org/networksize.html?start=2007-01-01&end=2021-11-08

As you can see, the number of Tor relays has stayed fairly consistent at between 6000 and 7000 for the last 6+ years. Also note that when you use Tor, your browser picks one of three guard nodes, each with a lifetime of approximately 120 days. It is only the middle and exit nodes which change whenever you request a new circuit or after you've used the same circuit for 10 minutes. So given that you will be using the same guard node for a period of time, then you have around 6000-7000 possible entry/exit combinations.
vv181
Legendary
*
Offline Offline

Activity: 1932
Merit: 1273


View Profile
November 07, 2021, 02:37:41 PM
Merited by ABCbits (3), Pmalek (2)
 #36

Quote
Some exit relays are considered as bad exits. They might listen in your traffic, change your traffic etc. Tor does not choose them (as long as you don't explicitly allow it).
How would TOR know that some exit nodes are "bad" and have ways to monitor or manipulate the traffic routed through them?
A few resources about how they did it:

Bad relay work and:
Do you actively look for bad relays?

Yes. For our automated issue detection see exitmap and sybilhunter.

Other monitors include tortunnel, SoaT, torscanner, and DetecTor.

And if they have such knowledge, why are those nodes not removed and blacklisted?
As on Criteria for rejecting bad relays, in short, there is a difference between misconfigured exit relays and malicious relays, the former will not be directly removed from the network since it rather can be used as a guard(entry) or middle relay, and the latter, it will immediately be removed.
BernyJB (OP)
Full Member
***
Offline Offline

Activity: 168
Merit: 190


View Profile
November 08, 2021, 01:43:05 PM
Merited by Symmetrick (2), JayJuanGee (1)
 #37

If the police are non-existent then how could you go to prison that's kind of confusing. or maybe you're saying the police only show up when you don't need them. i could understand that maybe. Grin

Best of luck. NOBODY can understand my country.  Grin
We're talking about a country that elects a vice president while she's under indictment on several different charges, high treason among them. https://en.wikipedia.org/wiki/Cristina_Fern%C3%A1ndez_de_Kirchner#Legal_charges

Let me give you a couple of pointers:

A few years ago, a guy saw 3 thugs break into his business (a convenience store) that was just across the street from his house. So he took his (legally owned) gun, crossed the street, and shot the burglars down. The guy went to prison because his permit didn't allow him to take his gun to the street, so it was "illegal carry". None of the 3 burglars died, and none of them was even indicted.

In 2017 or 2018, a guy was working as a security guard in a warehouse. He was armed with a "Ballester-Molina" pistol, similar to a Colt 1911.
A group of guys broke in. A gunfight ensued. He managed to kill one of the guys, and wounded a few more. In the process, he was wounded.
He was arrested because he was "carrying without a license", and his boss denied even knowing him, even when he could (and did) prove he was working for him, and he had provided him with the weapon. Again, none of the burglars was even charged.

in 2019, I was walking one night along one of Buenos Aires' most important streets (9 de Julio Avenue), when I saw a guy laying down on the sidewalk, handcuffed and squealing like a dying pig, surrounded by about a dozen cops. I kept on walking, as I was going to work  at a mcdonald's store about 100ft. away, and knew damn well I was gonna learn what happened soon enough. About 2 hours later, a couple of cops showed up.
The guy had been caught red-handed having beat up a girl right outside a university, and trying to rape her. The girl was sitting in the side, all bruised, waiting on the ambulance to show up.
So I talked to the cops. They had called the prosecutor, and when he learned the guy was homeless, he refused to prosecute him. they had to let him go.  

Now tell me: you really think you can understand that?

Thank you n0nce, I'll check it out.
The good thing about Binance is it allows me to buy directly in ARS, which is very convenient, especially considering Argentinian money is as volatile as cryptocurrencies...  Grin


BernyJB (OP)
Full Member
***
Offline Offline

Activity: 168
Merit: 190


View Profile
November 08, 2021, 02:04:28 PM
 #38


I am not American though.

I've seen what they did to McAfee. His crime was avoiding his taxes. He got pwned in Spain. Died in a cell. I've never heard of a German guy that avoided his taxes getting pwned in the US by the German officers.

There were other examples too. Another one was the owner of btc-e. He got pwned in Greece... by the FEDs. How is that possible?

Yeah, McAffee had it coming.
On the other hand, Gottfrid Svartholm, Fredrik Neij, and Peter Sunde fought tooth and nail against the US justice system. After years lobbying the Swedish government, they finally filed charges against them, and they got arrested. They spent a few years in prison, and now they're free as birds, and nobody can touch them. And The Pirate Bay never got offline, and it's running today, stronger than ever.

In the meantime, the MPAA started a war against the Yify torrent site, and its owner, Yiftach Swery. They shut down the original site, and literally HUNDREDS of mirror sites popped up. Since, Swery retired, and Yify changed name to YTS. Still going strong.

Thank you all for the replies. Last night I realized I had been overcomplicating things. I don't need Tor, and chances are I don't need Tails (which is proving to be a pain in the rear to set up) either. If I'm running a wallet offline, I'm already safe. I'm thinking about using it together with a number of paper wallets, and I should be ok.

titular
Sr. Member
****
Offline Offline

Activity: 287
Merit: 363


"Stop using proprietary software."


View Profile
November 11, 2021, 01:07:28 AM
 #39

I tried to post this on the "Serious Discussion" board, as it doesn't necessarily pertains to Bitcoin, but couldn't do it. Sorry.  Embarrassed

So, as I stated before, I've been doing a lot of research, while getting ready to start investing. Not surprisingly, I learned that there are a lot of criminals preying on crypto investors.
Now, money is (courtesy of, among other things, the damn pandemic), very tight. I've been looking at ways that may be within my means (or lack thereof) to make my investments as secure as possible.
So far, I'm looking at using 3 operating systems (Fedora Linux for my main activity online, most likely with Tor, Windows 8.1 inside a virtual machine for information and monitoring purposes only, and Tails with Tor for coin cold storage).
My question would be, initially, about VPN's.

Would using Tor over a VPN be a good idea for crypto trading? I understand (to a point) the advantages of such a setup, but would it provide any real advantages in this case? Is it worth the extra expense?
I know Linux is generally (not 100%) immune to malware, but I'm particularly worried about phishing and keyloggers. In the meantime, I have installed ClamAV already, and I'm keeping as secure as I can. Am I overthinking it?

Using a VPN with tor is generally only recommended if you can configure it properly. If not, you are likely not doing yourself any favors.

Tails w/Tor for cold storage is a must though.

▄▄███████████████████▄▄
▄██████████████████████▄
███████████▀▌▄▀██████████
███████▄▄███████▄▄███████
██████▄███▀▀██▀██████████
█████████▌█████████▌█████
█████████▌█████████▌█████
██████████▄███▄███▀██████
████████████████▀▀███████
███████████▀▀▀███████████
█████████████████████████
▀█████▀▀████████████████▀
▀▀███████████████████▀▀
Peach
BTC bitcoin
Buy and Sell
Bitcoin P2P
.
.
▄▄███████▄▄
▄████████
██████▄
▄██
█████████████████▄
▄███████
██████████████▄
███████████████████████
█████████████████████████
████████████████████████
█████████████████████████
▀███████████████████████▀
▀█████████████████████▀
▀██████████████████▀
▀███████████████▀
▀▀███████▀▀

▀▀▀▀███▀▀▀▀
Available in
EUROPE | AFRICA
LATIN AMERICA
▄▀▀▀











▀▄▄▄


███████▄█
███████▀
██▄▄▄▄▄░▄▄▄▄▄
████████████▀
▐███████████▌
▐███████████▌
████████████▄
██████████████
███▀███▀▀███▀
.
Download on the
App Store
▀▀▀▄











▄▄▄▀
▄▀▀▀











▀▄▄▄


▄██▄
██████▄
█████████▄
████████████▄
███████████████
████████████▀
█████████▀
██████▀
▀██▀
.
GET IT ON
Google Play
▀▀▀▄











▄▄▄▀
o_e_l_e_o
In memoriam
Legendary
*
Offline Offline

Activity: 2268
Merit: 18510


View Profile
November 11, 2021, 09:19:35 AM
 #40

Tails w/Tor for cold storage is a must though.
Cold storage should never be online, in which case you don't need Tor. If your device is online, even if all your traffic is being routed through Tor, then it's not cold storage.

Unless of course you mean using Tails as cold storage on a permanently airgapped device, transferring your signed transactions to an online device via QR code or USB drive, and then broadcasting them via Tor, in which case I agree.
Kakmakr
Legendary
*
Online Online

Activity: 3444
Merit: 1957

Leading Crypto Sports Betting & Casino Platform


View Profile
November 11, 2021, 11:23:21 AM
 #41

I presume you are using Tails with a persistent volume, because every time you reboot... you resort to a old version of the Electrum wallet? So, did you download the latest Electrum wallet and installed it on the persistent volume?

Use this guide ==> https://electrum.readthedocs.io/en/latest/tails.html to configure Tails to use the most current version of Electrum on Tails. (The risk of using a persistent volume is not having a "clean" boot after each reboot)  Tongue 

..Stake.com..   ▄████████████████████████████████████▄
   ██ ▄▄▄▄▄▄▄▄▄▄            ▄▄▄▄▄▄▄▄▄▄ ██  ▄████▄
   ██ ▀▀▀▀▀▀▀▀▀▀ ██████████ ▀▀▀▀▀▀▀▀▀▀ ██  ██████
   ██ ██████████ ██      ██ ██████████ ██   ▀██▀
   ██ ██      ██ ██████  ██ ██      ██ ██    ██
   ██ ██████  ██ █████  ███ ██████  ██ ████▄ ██
   ██ █████  ███ ████  ████ █████  ███ ████████
   ██ ████  ████ ██████████ ████  ████ ████▀
   ██ ██████████ ▄▄▄▄▄▄▄▄▄▄ ██████████ ██
   ██            ▀▀▀▀▀▀▀▀▀▀            ██ 
   ▀█████████▀ ▄████████████▄ ▀█████████▀
  ▄▄▄▄▄▄▄▄▄▄▄▄███  ██  ██  ███▄▄▄▄▄▄▄▄▄▄▄▄
 ██████████████████████████████████████████
▄▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▄
█  ▄▀▄             █▀▀█▀▄▄
█  █▀█             █  ▐  ▐▌
█       ▄██▄       █  ▌  █
█     ▄██████▄     █  ▌ ▐▌
█    ██████████    █ ▐  █
█   ▐██████████▌   █ ▐ ▐▌
█    ▀▀██████▀▀    █ ▌ █
█     ▄▄▄██▄▄▄     █ ▌▐▌
█                  █▐ █
█                  █▐▐▌
█                  █▐█
▀▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▀█
▄▄█████████▄▄
▄██▀▀▀▀█████▀▀▀▀██▄
▄█▀       ▐█▌       ▀█▄
██         ▐█▌         ██
████▄     ▄█████▄     ▄████
████████▄███████████▄████████
███▀    █████████████    ▀███
██       ███████████       ██
▀█▄       █████████       ▄█▀
▀█▄    ▄██▀▀▀▀▀▀▀██▄  ▄▄▄█▀
▀███████         ███████▀
▀█████▄       ▄█████▀
▀▀▀███▄▄▄███▀▀▀
..PLAY NOW..
BernyJB (OP)
Full Member
***
Offline Offline

Activity: 168
Merit: 190


View Profile
November 11, 2021, 04:58:59 PM
 #42

o_e_l_e_o: that's absolutely true. However, if there was a way for you to completely anonymize the very  fact that you own cryptocurrency, or even a crypto wallet, you'd arguably be safe(ish), right?
o_e_l_e_o
In memoriam
Legendary
*
Offline Offline

Activity: 2268
Merit: 18510


View Profile
November 11, 2021, 08:11:53 PM
 #43

o_e_l_e_o: that's absolutely true. However, if there was a way for you to completely anonymize the very  fact that you own cryptocurrency, or even a crypto wallet, you'd arguably be safe(ish), right?
Being completely anonymous* would certainly help to protect you against a number of attacks, such as attacks targeted against you specifically, malware directed against you specifically, $5 wrench attacks, physical compromise of your devices, attacks against your back ups, etc. However, it does not make you safe from any untargeted attacks such as clipboard malware or malicious wallet software.

*Glossing over the fact that it is close to impossible to be completely anonymous online.
Pages: 1 2 3 [All]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!