Bitcoin Forum
April 26, 2024, 10:47:26 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1] 2 »  All
  Print  
Author Topic: "Bitcoin over Tor isn't a good idea"  (Read 404 times)
BrotherCreamy (OP)
Newbie
*
Offline Offline

Activity: 29
Merit: 45


View Profile
September 29, 2022, 03:58:45 PM
Merited by hugeblack (6), LoyceV (4), o_e_l_e_o (4), vapourminer (1), odolvlobo (1), Welsh (1), ABCbits (1), mk4 (1), DdmrDdmr (1), dkbit98 (1), vv181 (1)
 #1

Hi guys,

I just stumbled across this paper (https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.1054.9020&rep=rep1&type=pdf), which talks about huge vulnerabilities encountered when running a Bitcoin node over Tor.

Quote
In this paper we show that combining Tor and Bitcoin creates a new attack vector. A low-resource attacker can gain full control of information flows between all users who chose to use Bitcoin over Tor. In particular the attacker can link together user’s transactions regardless of pseudonyms used, control which Bitcoin blocks and transactions are relayed to user and can delay or discard user’s transactions and blocks. Moreover, we show how an attacker can fingerprint users and then recognize them and learn their IP addresses when they decide to connect to the Bitcoin network directly.

What do you guys think?

I'm tossing up whether to continue using Tor or switch back to clearnet.
1714128446
Hero Member
*
Offline Offline

Posts: 1714128446

View Profile Personal Message (Offline)

Ignore
1714128446
Reply with quote  #2

1714128446
Report to moderator
If you want to be a moderator, report many posts with accuracy. You will be noticed.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714128446
Hero Member
*
Offline Offline

Posts: 1714128446

View Profile Personal Message (Offline)

Ignore
1714128446
Reply with quote  #2

1714128446
Report to moderator
1714128446
Hero Member
*
Offline Offline

Posts: 1714128446

View Profile Personal Message (Offline)

Ignore
1714128446
Reply with quote  #2

1714128446
Report to moderator
1714128446
Hero Member
*
Offline Offline

Posts: 1714128446

View Profile Personal Message (Offline)

Ignore
1714128446
Reply with quote  #2

1714128446
Report to moderator
NotATether
Legendary
*
Online Online

Activity: 1582
Merit: 6682


bitcoincleanup.com / bitmixlist.org


View Profile WWW
September 29, 2022, 06:16:34 PM
 #2

The paper says that running Tor and clearnet together mitigates the attack so just so that. Other short-term solutions I can think of:

- "Glitch" the address buckets - randomly drop addresses from the bucket on an hourly interval even when they are not full.
- Require all peers to submit their block height block hash of their longest tip, and ban nodes that don't have info that matches what is stored locally.
- glitch the banlist by randomly deleting some banned peers which weren't added manually.
- Reply to GETADDR messages with randomized ADDR messages that changes on each request.

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
odolvlobo
Legendary
*
Offline Offline

Activity: 4298
Merit: 3209



View Profile
September 29, 2022, 08:21:14 PM
Merited by Foxpup (1), hugeblack (1)
 #3

Still reading, but I found this...
Quote
The proof of work consists of finding a cryptographic hash value for a block of transactions which starts with a certain number of leading zero bits (32 when Bitcoin was first proposed, 67 zero bits at present).

That misconception will never die.

Join an anti-signature campaign: Click ignore on the members of signature campaigns.
PGP Fingerprint: 6B6BC26599EC24EF7E29A405EAF050539D0B2925 Signing address: 13GAVJo8YaAuenj6keiEykwxWUZ7jMoSLt
Welsh
Staff
Legendary
*
Offline Offline

Activity: 3248
Merit: 4110


View Profile
September 29, 2022, 10:35:23 PM
 #4

I think we fall into the trap that Tor automatically makes everything better, when it doesn't. Basically, when ever you add another layer to your security, there's the potential problem of introducing a new layer of attack. For example, there's some real concerns about privacy when it comes to Tor. That's been well documented, and actually made it to mainstream tv shows, but we still automatically assume Tor is safe.

The real question is your threat model though. Since, running Tor also removes some of the problems of running it without Tor. It would probably take too long to go through everything that could potentially be compromised from doing one or the other. So, it's really up to the user themselves to decide what's better from a individual perspective.
BrotherCreamy (OP)
Newbie
*
Offline Offline

Activity: 29
Merit: 45


View Profile
September 30, 2022, 02:20:55 AM
Last edit: September 30, 2022, 10:18:34 AM by mprep
 #5

Still reading, but I found this...
Quote
The proof of work consists of finding a cryptographic hash value for a block of transactions which starts with a certain number of leading zero bits (32 when Bitcoin was first proposed, 67 zero bits at present).

That misconception will never die.


Can you explain for the noobs?



The paper says that running Tor and clearnet together mitigates the attack so just so that. Other short-term solutions I can think of:

- "Glitch" the address buckets - randomly drop addresses from the bucket on an hourly interval even when they are not full.
- Require all peers to submit their block height block hash of their longest tip, and ban nodes that don't have info that matches what is stored locally.
- glitch the banlist by randomly deleting some banned peers which weren't added manually.
- Reply to GETADDR messages with randomized ADDR messages that changes on each request.

Quote
Another advice for a user would be to run two Bitcoin nodes, one over Tor and one without, and compare their blockchains and unconfirmed transactions. This would prevent from creation of virtual reality for Tor-only users.

So are you saying I just allow my node to connect on both clearnet and Tor, or create two separate nodes and some method of comparing the respective states, as suggested in the paper?

Thanks for all your suggestions. Unfortunately I'm not super tech savvy and so I imagine these will be beyond my ability to integrate.

[moderator's note: consecutive posts merged]
OgNasty
Donator
Legendary
*
Offline Offline

Activity: 4718
Merit: 4226


Leading Crypto Sports Betting & Casino Platform


View Profile WWW
September 30, 2022, 04:03:54 AM
 #6

I feel like the more TOR grows the less of an attack vector this is. If Bitcoin was running over TOR by default and all users running core software were also acting as TOR exit nodes, I don’t realistically see this being a major concern. At present though, sure. TOR doesn’t have enough participants to make it decentralized enough to secure something like the Bitcoin network.

..Stake.com..   ▄████████████████████████████████████▄
   ██ ▄▄▄▄▄▄▄▄▄▄            ▄▄▄▄▄▄▄▄▄▄ ██  ▄████▄
   ██ ▀▀▀▀▀▀▀▀▀▀ ██████████ ▀▀▀▀▀▀▀▀▀▀ ██  ██████
   ██ ██████████ ██      ██ ██████████ ██   ▀██▀
   ██ ██      ██ ██████  ██ ██      ██ ██    ██
   ██ ██████  ██ █████  ███ ██████  ██ ████▄ ██
   ██ █████  ███ ████  ████ █████  ███ ████████
   ██ ████  ████ ██████████ ████  ████ ████▀
   ██ ██████████ ▄▄▄▄▄▄▄▄▄▄ ██████████ ██
   ██            ▀▀▀▀▀▀▀▀▀▀            ██ 
   ▀█████████▀ ▄████████████▄ ▀█████████▀
  ▄▄▄▄▄▄▄▄▄▄▄▄███  ██  ██  ███▄▄▄▄▄▄▄▄▄▄▄▄
 ██████████████████████████████████████████
▄▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▄
█  ▄▀▄             █▀▀█▀▄▄
█  █▀█             █  ▐  ▐▌
█       ▄██▄       █  ▌  █
█     ▄██████▄     █  ▌ ▐▌
█    ██████████    █ ▐  █
█   ▐██████████▌   █ ▐ ▐▌
█    ▀▀██████▀▀    █ ▌ █
█     ▄▄▄██▄▄▄     █ ▌▐▌
█                  █▐ █
█                  █▐▐▌
█                  █▐█
▀▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▀█
▄▄█████████▄▄
▄██▀▀▀▀█████▀▀▀▀██▄
▄█▀       ▐█▌       ▀█▄
██         ▐█▌         ██
████▄     ▄█████▄     ▄████
████████▄███████████▄████████
███▀    █████████████    ▀███
██       ███████████       ██
▀█▄       █████████       ▄█▀
▀█▄    ▄██▀▀▀▀▀▀▀██▄  ▄▄▄█▀
▀███████         ███████▀
▀█████▄       ▄█████▀
▀▀▀███▄▄▄███▀▀▀
..PLAY NOW..
NotATether
Legendary
*
Online Online

Activity: 1582
Merit: 6682


bitcoincleanup.com / bitmixlist.org


View Profile WWW
September 30, 2022, 05:30:11 AM
 #7

So are you saying I just allow my node to connect on both clearnet and Tor, or create two separate nodes and some method of comparing the respective states, as suggested in the paper?

Thanks for all your suggestions. Unfortunately I'm not super tech savvy and so I imagine these will be beyond my ability to integrate.

No you don't need to run two nodes.

By default, when you start Bitcoin Core, it tries to connect via IPV4, IPV6, and if you configured a Tor proxy (which you seemed to have done already), by Tor as well. There is no special configuration that you need to make to make your node attack-proof. You're only theoretically at risk if you have onlynet=tor in your config file or command line.

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
Kakmakr
Legendary
*
Offline Offline

Activity: 3430
Merit: 1957

Leading Crypto Sports Betting & Casino Platform


View Profile
September 30, 2022, 05:37:30 AM
 #8

It is well known that some 3L3tter agencies are running several Tor exit nodes ...so it is a great vulnerability to run a node over Tor, but it is still more secure than running it over a public network.  Roll Eyes

We should take some precautions to protect our "nodes" .... but nothing is 100% secure in a world where attacks are coming from highly trained and skilled people that knows almost all exploits in the system. ( A lot of those attacks are government sanctioned)  Roll Eyes

..Stake.com..   ▄████████████████████████████████████▄
   ██ ▄▄▄▄▄▄▄▄▄▄            ▄▄▄▄▄▄▄▄▄▄ ██  ▄████▄
   ██ ▀▀▀▀▀▀▀▀▀▀ ██████████ ▀▀▀▀▀▀▀▀▀▀ ██  ██████
   ██ ██████████ ██      ██ ██████████ ██   ▀██▀
   ██ ██      ██ ██████  ██ ██      ██ ██    ██
   ██ ██████  ██ █████  ███ ██████  ██ ████▄ ██
   ██ █████  ███ ████  ████ █████  ███ ████████
   ██ ████  ████ ██████████ ████  ████ ████▀
   ██ ██████████ ▄▄▄▄▄▄▄▄▄▄ ██████████ ██
   ██            ▀▀▀▀▀▀▀▀▀▀            ██ 
   ▀█████████▀ ▄████████████▄ ▀█████████▀
  ▄▄▄▄▄▄▄▄▄▄▄▄███  ██  ██  ███▄▄▄▄▄▄▄▄▄▄▄▄
 ██████████████████████████████████████████
▄▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▄
█  ▄▀▄             █▀▀█▀▄▄
█  █▀█             █  ▐  ▐▌
█       ▄██▄       █  ▌  █
█     ▄██████▄     █  ▌ ▐▌
█    ██████████    █ ▐  █
█   ▐██████████▌   █ ▐ ▐▌
█    ▀▀██████▀▀    █ ▌ █
█     ▄▄▄██▄▄▄     █ ▌▐▌
█                  █▐ █
█                  █▐▐▌
█                  █▐█
▀▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▀█
▄▄█████████▄▄
▄██▀▀▀▀█████▀▀▀▀██▄
▄█▀       ▐█▌       ▀█▄
██         ▐█▌         ██
████▄     ▄█████▄     ▄████
████████▄███████████▄████████
███▀    █████████████    ▀███
██       ███████████       ██
▀█▄       █████████       ▄█▀
▀█▄    ▄██▀▀▀▀▀▀▀██▄  ▄▄▄█▀
▀███████         ███████▀
▀█████▄       ▄█████▀
▀▀▀███▄▄▄███▀▀▀
..PLAY NOW..
pooya87
Legendary
*
Offline Offline

Activity: 3430
Merit: 10504



View Profile
September 30, 2022, 05:46:55 AM
 #9

Still reading, but I found this...
Quote
The proof of work consists of finding a cryptographic hash value for a block of transactions which starts with a certain number of leading zero bits (32 when Bitcoin was first proposed, 67 zero bits at present).
That misconception will never die.
Can you explain for the noobs?
In short people are confusing a "smaller than or equal to comparison" with "counting number of zeros".

In bitcoin's PoW, after the hash is computed it is compared with the 256 bit target as an integer and if the integer representation of the hash was smaller than or equal to the target then it is a valid hash, otherwise it is rejected.

If we count zeros we could accept a wrong hash or reject a valid one.
For example assuming we only have 4 bits (instead of 256) and hash is 0101 (5), it is smaller than 0110 (6) and bigger than 0100 (4) but all three values start with the same number of zeros (1 zero in 4 bit representation). If the target were 0100 and you accept 0101 because it has the same number of starting zeros that is invalid hash and the block is rejected.

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
gmaxwell
Staff
Legendary
*
Offline Offline

Activity: 4158
Merit: 8382



View Profile WWW
September 30, 2022, 08:41:27 AM
Last edit: September 30, 2022, 09:03:59 AM by gmaxwell
Merited by hugeblack (6), Foxpup (4), o_e_l_e_o (4), pooya87 (3), NeuroticFish (2), DaveF (2), Cookdata (2), n0nce (2), vapourminer (1), ABCbits (1), DdmrDdmr (1)
 #10

That paper wasn't particularly correct when it was written--  essentially it's saying that a bad guy could dos attack all hidden service bitcoin peers AND make all clearnet peers ban all the tor peers.  And thus cause the tor using user to drop the protection of tor.  Okay, that used to be a concern but (1) the latter attack would have been highly visible and never happened and (2) "here is this benefit that DOS attacks might make you turn off" isn't a reason to not use the beneficial thing to begin with!

But worse, its completely inapplicable now -- and for many years -- because the banning mechanism they're discussing was removed.

But hey, every time I see someone promoting it I get extra information on which users are slightly more likely to be state actors trying to undermine the privacy of Bitcoin users.  So at least it has that benefit.

Kinda sucks though that bitcoiners don't even know that it's totally inapplicable and these same FUD threads keep getting repeated year after year and people that probably heard the correction don't remember.
DaveF
Legendary
*
Offline Offline

Activity: 3458
Merit: 6235


Crypto Swap Exchange


View Profile WWW
September 30, 2022, 11:54:01 AM
Merited by hugeblack (4), pooya87 (2), n0nce (1)
 #11

That paper wasn't particularly correct when it was written--  essentially it's saying that a bad guy could dos attack all hidden service bitcoin peers AND make all clearnet peers ban all the tor peers.  And thus cause the tor using user to drop the protection of tor.  Okay, that used to be a concern but (1) the latter attack would have been highly visible and never happened and (2) "here is this benefit that DOS attacks might make you turn off" isn't a reason to not use the beneficial thing to begin with!

But worse, its completely inapplicable now -- and for many years -- because the banning mechanism they're discussing was removed.

But hey, every time I see someone promoting it I get extra information on which users are slightly more likely to be state actors trying to undermine the privacy of Bitcoin users.  So at least it has that benefit.

Kinda sucks though that bitcoiners don't even know that it's totally inapplicable and these same FUD threads keep getting repeated year after year and people that probably heard the correction don't remember.

Someone should probably put together a website with a list of links to papers like the OP posted, a one or 2 line summary of what it says, and then a link to an article / post / document as to why it is wrong.

So, when someone comes and does post about it again, all someone else has to do is say no, that's wrong here is why and here is the link.

Just saves time, and discussion and so on.

-Dave

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
BlackHatCoiner
Legendary
*
Offline Offline

Activity: 1498
Merit: 7291


Farewell, Leo


View Profile
September 30, 2022, 01:36:55 PM
Merited by hugeblack (4), Foxpup (2)
 #12

Is the attack similar to Sybil attack, wherein the attacker handles multiple IP addresses and effectively "surrounds" a Bitcoin node? Doesn't this require computational power as well?

Quote
Bitcoin users connecting to the Bitcoin network through Tor or VPN obviously also do not accept incoming connections.
This is obviously incorrect. There's nothing preventing Tor nodes from accepting incoming connections.

At present though, sure. TOR doesn’t have enough participants to make it decentralized enough to secure something like the Bitcoin network.
Tor is the largest anonymity-preserving network at the moment.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
LFC_Bitcoin
Legendary
*
Offline Offline

Activity: 3514
Merit: 9488


#1 VIP Crypto Casino


View Profile
September 30, 2022, 04:19:24 PM
 #13

Storing any significant amount of bitcoin on any device, using any browser is stupid. I don’t care what privacy you supposedly think you have. Don’t use a VPN either. My stash is in deep, fucking cold storage, you’d have to torture me to get my seeds/passphrases.

Seriously, you are never safe browsing if you store bitcoin on the device you browse with.

Stay smart & HODL.

.
.BITCASINO.. 
.
#1 VIP CRYPTO CASINO

▄██████████████▄
█▄████████████▄▀▄▄▄
█████████████████▄▄▄
█████▄▄▄▄▄▄██████████████▄
███████████████████████████████
████▀█████████████▄▄██████████
██████▀██████████████████████
████████████████▀██████▌████
███████████████▀▀▄█▄▀▀█████▀
███████████████████▀▀█████▀
 ▀▀▀▀▀▀▀██████████████
          ▀▀▀████████
                ▀▀▀███

.
......PLAY......
VanillaH
Newbie
*
Offline Offline

Activity: 23
Merit: 5


View Profile
September 30, 2022, 10:25:14 PM
Merited by vapourminer (2)
 #14

What always bothered me about Tor is that there is not real incentive to be a node.

Yet, at the same, being a node requires many resources. Among them, you better have an ISP that's going to be lenient over all the crazy stuff that's going to go through your node!

As such, nodes are often run by intelligence agencies. Sad

It's why I don't really trust Tor...
BlackHatCoiner
Legendary
*
Offline Offline

Activity: 1498
Merit: 7291


Farewell, Leo


View Profile
October 01, 2022, 08:41:28 AM
Merited by vapourminer (1)
 #15

What always bothered me about Tor is that there is not real incentive to be a node.
There's the same incentive as with running a Bitcoin node: privacy. Whenever you use Tor to browse the internet privately, you're a node that relays traffic. That's why the more Tor users the better. You can use Nyx to see to whom you send information, by whom do you receive it, and other general bandwidth info.

What you must have meant is an incentive to run an exit node. Not only doesn't there be an incentive, but there's actually a disincentive, because IP addresses from exit nodes are not welcomed in some sites. That's why there are very few: https://tor.stackexchange.com/questions/646/why-are-there-only-1000-exit-relays/

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
mindrust
Legendary
*
Offline Offline

Activity: 3234
Merit: 2417



View Profile
October 01, 2022, 08:55:46 AM
 #16

As such, nodes are often run by intelligence agencies. Sad

It's why I don't really trust Tor...

The same goes for the dark/deep web. They want all the illegal activities to happen there so they can catch them all in one swoop. Just don't say or do anything online which you wouldn't do in your real life and you will be fine. As far as I am concerned TOR or any other stuff are only good for accessing information/websites which are blocked in your country. Some countries block porn websites too and it comes in handy in those situations too but I would never ever purchase drugs via TOR. I'd rather buy a ticket and visit the Netherlands instead.

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
BlackHatCoiner
Legendary
*
Offline Offline

Activity: 1498
Merit: 7291


Farewell, Leo


View Profile
October 01, 2022, 09:06:51 AM
Last edit: October 01, 2022, 10:09:59 AM by BlackHatCoiner
 #17

The same goes for the dark/deep web. They want all the illegal activities to happen there so they can catch them all in one swoop.
The only way to be caught in such site is if it isn't run by criminals but by actual agents as a honeypot, or if you're demanded to hand over personal information that might end up to the agents. Getting caught by de-anonymizing onion routing is the government's last course as it most of the times requires coordination with other nations. This attack is known as "correlation attack". It becomes even more difficult to de-anonymize if it's a hidden service.

but I would never ever purchase drugs via TOR.
You shouldn't, not because you might get caught, but because 99% of these sites are scam.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
VanillaH
Newbie
*
Offline Offline

Activity: 23
Merit: 5


View Profile
October 03, 2022, 01:21:56 PM
 #18

What always bothered me about Tor is that there is not real incentive to be a node.
There's the same incentive as with running a Bitcoin node: privacy. Whenever you use Tor to browse the internet privately, you're a node that relays traffic. That's why the more Tor users the better. You can use Nyx to see to whom you send information, by whom do you receive it, and other general bandwidth info.

What you must have meant is an incentive to run an exit node. Not only doesn't there be an incentive, but there's actually a disincentive, because IP addresses from exit nodes are not welcomed in some sites. That's why there are very few: https://tor.stackexchange.com/questions/646/why-are-there-only-1000-exit-relays/

You are a correct: I meant exit node.
vv181
Legendary
*
Offline Offline

Activity: 1932
Merit: 1273


View Profile
October 04, 2022, 12:36:30 AM
Merited by BlackHatCoiner (4), vapourminer (2)
 #19

Whenever you use Tor to browse the internet privately, you're a node that relays traffic. That's why the more Tor users the better.

Regular Tor users won't automatically act as a relay. That scenario is one of the alternative possible designs (https://support.torproject.org/alternate-designs/#make-every-user-a-relay), but as of now, it does not.

~I meant exit node.

Less exit node on the Tor network is very likely caused due to how the operator could get legal risk and exposure.
BlackHatCoiner
Legendary
*
Offline Offline

Activity: 1498
Merit: 7291


Farewell, Leo


View Profile
October 04, 2022, 02:58:20 PM
Merited by vapourminer (1)
 #20

Regular Tor users won't automatically act as a relay. That scenario is one of the alternative possible designs (https://support.torproject.org/alternate-designs/#make-every-user-a-relay), but as of now, it does not.
Weird, because whenever I have Tor Browser opened, it does have an uploading and downloading bandwidth. Indeed, from nyx I can see that it has relaying disabled:


That's with just one window, at the main "most private browsing experience" page. I presume these bytes transferred are like heartbeats?

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
Pages: [1] 2 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!