pull down to refresh
11 sats \ 2 replies \ @elvismercury OP 5 Jan \ parent \ on: Tor node attrition; or, The Trouble with Peerage bitcoin_beginners
Yup, understood wrt Tor / sybil.
My goal is to leak no IP info, so I'm starting w/ Tor-only. @ek was giving me a lot of help wrt using Core w/ a VPN, but I haven't yet come back to that one. In a pinch I know I can use the VPN and not care about port forwarding, but I've got a rock in my shoe about solving it the 'right' way.
You might as well run with
-proxy=127.0.0.1:9050
(assuming this is where your Tor SOCKS5 proxy is listening) and omit the -onlynet=onion
option. Then Bitcoin Core will be able to connect to IPv4, IPv6 and Tor peers, all via the Tor network, so the IPv4/6 peers pose no threat to revealing your IP address. This actually uses the entire Tor network as one big VPN with multiple exit points (the Tor exit nodes), also used by many others with the added benefit of being able to connect to .onion
addresses without exiting the "VPN" ;)reply
Oh great, that sounds like it gets me everything I want. Have made the change and re-started. Thanks :)
reply