Miron [ARCHIVE] on Nostr: 📅 Original date posted:2014-01-16 📝 Original message:On Wed, 2014-01-15 at ...
📅 Original date posted:2014-01-16
📝 Original message:On Wed, 2014-01-15 at 20:29 -0800, Miron wrote:
> On Wed, 2014-01-15 at 23:51 +0100, Mike Hearn wrote:
> ...
> > 3) SPV wallets that want to get a good mix of nodes for measuring
> > pending transactions identify nodes on the clearnet via their addr
> > announcements+service flag, in the normal way. They select some of
> > these nodes using the standard clearnet anti-sybil heuristics and
> > connect without using Tor. They proceed to query them for their hidden
>
> The SPV node could connect to the IP using Tor. It would preserve the
> privacy of the SPV node - hard to see it's running Bitcoin. It also
> reduces the ability of an attacker to MITM because the routing varies
> with each exit node.
>
It would also be good to gossip the mapping of (IP -> onion address).
This would allow detection of a future MITM, since the MITM can't spoof
the onion fingerprint.
Published at
2023-06-07 15:12:10Event JSON
{
"id": "2f5ba0602744f205e538bed3a95ff44b87461be81df0fd60b35a181996c5a92e",
"pubkey": "de70b2e669cfc1a6bd252e0469b74b1d28d0e6720864f44300dea89d4cf7654d",
"created_at": 1686150730,
"kind": 1,
"tags": [
[
"e",
"611ceaa526b00a1109fcff43c9c84b86475a1a1e055ca0ce884283c7fc0d8b94",
"",
"root"
],
[
"e",
"4a3efada2d25971220ca5c2e62cb7685dbadd2bfcc496aae2fc5746da692be0b",
"",
"reply"
],
[
"p",
"de70b2e669cfc1a6bd252e0469b74b1d28d0e6720864f44300dea89d4cf7654d"
]
],
"content": "📅 Original date posted:2014-01-16\n📝 Original message:On Wed, 2014-01-15 at 20:29 -0800, Miron wrote:\n\u003e On Wed, 2014-01-15 at 23:51 +0100, Mike Hearn wrote:\n\u003e ...\n\u003e \u003e 3) SPV wallets that want to get a good mix of nodes for measuring\n\u003e \u003e pending transactions identify nodes on the clearnet via their addr\n\u003e \u003e announcements+service flag, in the normal way. They select some of\n\u003e \u003e these nodes using the standard clearnet anti-sybil heuristics and\n\u003e \u003e connect without using Tor. They proceed to query them for their hidden\n\u003e \n\u003e The SPV node could connect to the IP using Tor. It would preserve the\n\u003e privacy of the SPV node - hard to see it's running Bitcoin. It also\n\u003e reduces the ability of an attacker to MITM because the routing varies\n\u003e with each exit node.\n\u003e \n\nIt would also be good to gossip the mapping of (IP -\u003e onion address).\nThis would allow detection of a future MITM, since the MITM can't spoof\nthe onion fingerprint.",
"sig": "6ef974cdde53e1aef9793a47018a06cd1df0143f08ee01668cf4e3ad6de2827ac8f2f249ddbb6bd33a551e7613731a46d7e6a6202e74c0b550e131415f3695f4"
}