Mistr Bigs [ARCHIVE] on Nostr: 📅 Original date posted:2014-11-27 📝 Original message:That's what I was trying ...
📅 Original date posted:2014-11-27
📝 Original message:That's what I was trying to say... The researchers are deanonymizing
transactions from non-Tor connected hosts. So why are we talking about Tor
limitations in response to this? Shouldn't we be discussing how to address
the issues in Bitcoin proper?
M
On 11/27/2014 9:30 PM, Gregory Maxwell wrote:
On Thu, Nov 27, 2014 at 5:44 PM, <misterbg6 at gmail.com> wrote:
I might be mistaken, but it seems to me this paper discusses unintended ways
of obtaining the IP addresses of clients involved in transactions on the
core Bitcoin network.
You're mistaken. :)
If a node is used exclusively via tor it effectively doesn't have a IP address.
(short of bugs of a class that aren't discussed here)
The paper is about fingerprinting approaches that probabilistically
connect transactions to hosts that you can already identify their IPs.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <
http://lists.linuxfoundation.org/pipermail/bitcoin-dev/attachments/20141128/8a21d8d1/attachment.html>
Published at
2023-06-07 15:27:35Event JSON
{
"id": "c82807242d3a48e6bf0fc9fe7cc9bdc2e63191624ad5613ba8c7645bb591c442",
"pubkey": "3f309567f3bf9fe80a3f4757938eb8b06fece90dab3fb770f539c0399eabca4e",
"created_at": 1686151655,
"kind": 1,
"tags": [
[
"e",
"361488dab143c9c8ffe7e1b6278eb4c26a4e028aa93b779a32013ddcda18317a",
"",
"root"
],
[
"e",
"c6485ae40836dc38d9a97ddc1aa533a2c3e7127322978118ac23c38aebc79320",
"",
"reply"
],
[
"p",
"4aa6cf9aa5c8e98f401dac603c6a10207509b6a07317676e9d6615f3d7103d73"
]
],
"content": "📅 Original date posted:2014-11-27\n📝 Original message:That's what I was trying to say... The researchers are deanonymizing\ntransactions from non-Tor connected hosts. So why are we talking about Tor\nlimitations in response to this? Shouldn't we be discussing how to address\nthe issues in Bitcoin proper?\n\nM\n\nOn 11/27/2014 9:30 PM, Gregory Maxwell wrote:\n\nOn Thu, Nov 27, 2014 at 5:44 PM, \u003cmisterbg6 at gmail.com\u003e wrote:\n\nI might be mistaken, but it seems to me this paper discusses unintended ways\nof obtaining the IP addresses of clients involved in transactions on the\ncore Bitcoin network.\n\nYou're mistaken. :)\n\nIf a node is used exclusively via tor it effectively doesn't have a IP address.\n\n(short of bugs of a class that aren't discussed here)\n\nThe paper is about fingerprinting approaches that probabilistically\nconnect transactions to hosts that you can already identify their IPs.\n-------------- next part --------------\nAn HTML attachment was scrubbed...\nURL: \u003chttp://lists.linuxfoundation.org/pipermail/bitcoin-dev/attachments/20141128/8a21d8d1/attachment.html\u003e",
"sig": "2f372987699f38c328ec96812f92a5aedd55b92f8b5a39a2c31f4b599d97b0b95b4ee244d12f3c01a924a76a1cdeec7863e26e515b8732847dfd39332afb96fe"
}