doged official darknodes shouldnt be relaying bitcoin, or any other tor network data for that matter. please change them back, or keep them for personal use.
until its resolved, please use the following official tor nodes i have created that are
not carrying tor network traffic,
only doged:
connect=dogedkxa6fjxbssx.onion
connect=bmxto4gcy5u7pwic.onion
connect=7gpe3lp3jpiufd54.onion
or feel free to use our i2p network.
information has come out saying that the Tor network is going to be attacked soon,
https://www.techdirt.com/articles/20141222/07260229500/vague-warnings-pending-tor-attack-while-exit-nodes-are-being-seized.shtmlas long as our nodes are only carrying doged transactions, i doubt they will be targeted. if they are seized, i will sue the living shit out of whoever seizes them, i assure you.
Hello!
I was surfing the web looking for information on crypto-currencies when I came upon your web site and discovered this forum.
I am new to this forum and to DogeCoinDark but I DO know something about how TOR operates. I find it interesting that you are giving an individual advice on how to run a TOR node when you obviously don't understand how TOR works.
First, there is NO method on instructing a TOR relay route a specific protocol or port. A relay is exactly that. A RELAY. The accept and reject verbs are only important when you are defining exit policies on exit nodes. So telling a node operator that he/she must only route "doged traffic" is impossible.
Second, if the operator is running an exit node and was concerned about being discovered, then ONLY routing DOGED traffic would cause that exit node to shine brighter than all other exit nodes by virtue of that fact that it is only allowing DOGED traffic. The more protocols/ports allowed through the exit node increases the anonymity of the node by virtue of the fact that the "DOGED traffic" is obfuscated by all the other protocols/ports.
Third, let's talk about 2 nodes of the 3 you listed above. I did 2 minutes of research and obtained the following information. If you are trying to hide the nodes using ".onion addresses" then you have failed miserably.
From the way you speak in this forum, I assume that you are a vain person would be vain enough to have used "DOGED" as part of the naming of your TOR router(s). That is the most useful method for uncovering the actual location of a TOR hidden service. A simple lookup using
https://atlas.torproject.org yielded the following results:
DogeDNY - IP 104.131.30.6
DogeDSING - IP 128.199.130.227
Verbose information about these nodes can be found at
https://atlas.torproject.org/#details/56A0F6BA57EC045E7B14DECDA03C6FB57E3C6355 and
https://atlas.torproject.org/#details/56A0F6BA57EC045E7B14DECDA03C6FB57E3C6355I must confess that I was very excited about investigating your crypto-currency further but after just getting started I realize that the correct way to hide your TOR node behind a onion address was completely missed on your part.
To tell your subscribers that you are "hidden" is truly a dis-service. I was able to locate 2 of your 3 servers in a matter of minutes.
Lastly, if an organization is going to "attack" your nodes and you're going to "sue the living shit" out of them I would think that it would be rather difficult to sue the NSA or FBI because they will be the one's knocking on your door.
"I was surfing the web looking for information on crypto-currencies"
please.. continue..
"So telling a node operator that he/she must only route "doged traffic" is impossible."
that is inaccurate, as our three onion nodes above are only relaying doged transactions. our i2p has been set up the same way. read up on the newest version of tor. the nodes are currently only using tor as a sock connection and listen on one port (the doged port), and relaying to other nodes. the point is to hide the users ip address, which they are doing currently, and very well i might add.
also, our nodes are listed under doged, as to remain transparent and "findable" by our users! i am well aware they are locatable on atlas, as that is the point (duhh lol). here is an example of bitcoin onion nodes, and this can be done for any named node:
https://atlas.torproject.org/#search/coin"Lastly, if an organization is going to "attack" your nodes and you're going to "sue the living shit" out of them I would think that it would be rather difficult to sue the NSA or FBI because they will be the one's knocking on your door."
why would they be concerned with us? i doubt they would be, but if our nodes were seized, i would sue, as they are only relaying our software, which is completely legal, and not "general tor traffic", which cannot be accounted for.
you should read up on the newest version of tor relays, as well as i2p, as i2p seems to be growing and becoming an even better option every day.
if you have any further questions, please feel free to ask, learning is encouraged here, especially when it comes to privacy/anonymity. stick around, please =]