Bitcoin Forum
May 02, 2024, 06:12:12 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 [4]  All
  Print  
Author Topic: Are blockchain explorer threat to the privacy ?  (Read 757 times)
BlackHatCoiner
Legendary
*
Offline Offline

Activity: 1512
Merit: 7340


Farewell, Leo


View Profile
October 23, 2023, 09:52:31 AM
 #61

Do you really think that cops or ISP think like that? If you hide your TOR usage from your ISP and connect TOR that way, then you protect your privacy and at the same time, no one has doubt about you because you look like an average guy from the outside.
I know that in the eyes of a surveillance state, I'm looking suspicious, but this happens to protect what I'm wishing to hide. But, nonetheless, just because some people think I'm doing something illegal via Tor, it doesn't mean they can arrest me without evidence.

When you discover that majority of people don't care about privacy online but you care, you'll also discover that you probably look a little different from crowd for those, who watch everyone. In order to protect your privacy, you have to act like you don't care, like, using Tor bridges to hide your tor activity or VPN + Tor.
You can't act beyond an extent. VPN providers are likely honeypots. If you connect to Tor via a VPN (which is not recommended), you might as well look suspicious, because:
- VPNs are not used by the "crowd" either.
- VPNs can hand over logs if the authorities request it, and see you're connecting to Tor.

You can't protect your privacy if you're "acting" you don't care. You obviously don't get to the streets and start yelling "I'm protecting my privacy" (as that would actually reduce it), but that doesn't mean you won't utilize privacy protecting tools like Tor, because the ISP will deem you suspicious. Your alternative is to let the ISP know what you're doing. Your choice.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
1714673532
Hero Member
*
Offline Offline

Posts: 1714673532

View Profile Personal Message (Offline)

Ignore
1714673532
Reply with quote  #2

1714673532
Report to moderator
1714673532
Hero Member
*
Offline Offline

Posts: 1714673532

View Profile Personal Message (Offline)

Ignore
1714673532
Reply with quote  #2

1714673532
Report to moderator
There are several different types of Bitcoin clients. The most secure are full nodes like Bitcoin Core, but full nodes are more resource-heavy, and they must do a lengthy initial syncing process. As a result, lightweight clients with somewhat less security are commonly used.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
Synchronice
Hero Member
*****
Offline Offline

Activity: 854
Merit: 772


Watch Bitcoin Documentary - https://t.ly/v0Nim


View Profile
October 23, 2023, 10:57:05 AM
 #62

I know that in the eyes of a surveillance state, I'm looking suspicious, but this happens to protect what I'm wishing to hide. But, nonetheless, just because some people think I'm doing something illegal via Tor, it doesn't mean they can arrest me without evidence.
I don't say that they will arrest you without evidence, I have never said or mentioned that. I say that they will try more to track you when they see that you are trying to protect your privacy, especially when it comes to public tor usage. I don't say people who use Tor are criminals, for sure, they aren't but there is a group of people who use that for criminal activities and that's more than enough excuse for governments to spy on you even if you don't do anything bad. Tor is also different from VPN. VPN is used by many people and they can't simply spy on so many people but Tor is used by narrow audience.
Just imagine, they see that John uses Tor, they automatically suspect John is hiding something or doing something wrong. This prioritizes John and they probably track your more carefully. But if you hide your Tor activity, like via a tor bridge and they don't know that you use Tor, they won't prioritize you and see you like a regular internet user and regular user is never their important target.

When you discover that majority of people don't care about privacy online but you care, you'll also discover that you probably look a little different from crowd for those, who watch everyone. In order to protect your privacy, you have to act like you don't care, like, using Tor bridges to hide your tor activity or VPN + Tor.
You can't act beyond an extent. VPN providers are likely honeypots. If you connect to Tor via a VPN (which is not recommended), you might as well look suspicious, because:
- VPNs are not used by the "crowd" either.
- VPNs can hand over logs if the authorities request it, and see you're connecting to Tor.

You can't protect your privacy if you're "acting" you don't care. You obviously don't get to the streets and start yelling "I'm protecting my privacy" (as that would actually reduce it), but that doesn't mean you won't utilize privacy protecting tools like Tor, because the ISP will deem you suspicious. Your alternative is to let the ISP know what you're doing. Your choice.
You can use Tor Bridge but it's not the best solution because Tor Bridges are meant for people who really need it, i.e. for people who want to access censored content from Iran and other countries. I don't promote VPNs but for basic privacy, some VPNs like Mullvad and IVPN are good solutions, they are probably less likely to be honeypot but you know, number one rule is to be critical and pessimist when it comes to tools you use for protecting your privacy, you should always assume worst case scenario.
By the way, showing your ISP that you use Tor is like yelling "I am protecting my privacy" in the street. Obfuscated servers are better choice.

.freebitcoin.       ▄▄▄█▀▀██▄▄▄
   ▄▄██████▄▄█  █▀▀█▄▄
  ███  █▀▀███████▄▄██▀
   ▀▀▀██▄▄█  ████▀▀  ▄██
▄███▄▄  ▀▀▀▀▀▀▀  ▄▄██████
██▀▀█████▄     ▄██▀█ ▀▀██
██▄▄███▀▀██   ███▀ ▄▄  ▀█
███████▄▄███ ███▄▄ ▀▀▄  █
██▀▀████████ █████  █▀▄██
 █▄▄████████ █████   ███
  ▀████  ███ ████▄▄███▀
     ▀▀████   ████▀▀
BITCOIN
DICE
EVENT
BETTING
WIN A LAMBO !

.
            ▄▄▄▄▄▄▄▄▄▄███████████▄▄▄▄▄
▄▄▄▄▄██████████████████████████████████▄▄▄▄
▀██████████████████████████████████████████████▄▄▄
▄▄████▄█████▄████████████████████████████▄█████▄████▄▄
▀████████▀▀▀████████████████████████████████▀▀▀██████████▄
  ▀▀▀████▄▄▄███████████████████████████████▄▄▄██████████
       ▀█████▀  ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀  ▀█████▀▀▀▀▀▀▀▀▀▀
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.PLAY NOW.
Pages: « 1 2 3 [4]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!