Author

Topic: [ask] Best way to hide bitcoin server IP? (Read 1808 times)

legendary
Activity: 1974
Merit: 1077
Honey badger just does not care
February 03, 2014, 10:41:17 AM
#12
To hide your IP you need to run your node behind TOR. That's the only reliable way and very easy as bitcoind has native support for that.

What's wrong with good, old VPN? Much, much easier than TOR, and there are many VPN providers who doesn't log traffic. Even if you get one VPN provider who lies and logs it, your IP is protected without the VPN provider's full cooperation with the interested third party.
legendary
Activity: 1596
Merit: 1030
Sine secretum non libertas
February 02, 2014, 11:54:36 PM
#11
I think tor is perfect for protecting against DDOS.
newbie
Activity: 59
Merit: 0
February 01, 2014, 09:58:14 AM
#10
To answer that question, the responder would really need to know your threat model.

the only thing i care is a persistent hacker/competitor cannot find my bitcoind ip address so he can ddos or do any kind of activity which can harm my bitcoind server. i don not need perfect 100% anonymous like for doing criminal activity.

for my case i think using a proxy is enough? if a hacker managed to find the ip he only harm the proxy server. bitcoind server remains safe unless he able to root proxy server and read the log.

what do you think?
legendary
Activity: 2053
Merit: 1356
aka tonikt
February 01, 2014, 07:54:24 AM
#9
I read from here: http://bitcoin.stackexchange.com/questions/193/how-do-i-see-the-ip-address-of-a-bitcoin-transaction

that it is possible (and might be easy) to reveal bitcoin sender's ip address.

so the question is, what do you think is the best and reliable way to protect a bitcoin server's ip address.

maybe a proxy or vpn is enough? are TOR and I2P reliable enough to handle bitcoin transaction?

i'm building a bitcoin service and won't let anyone find my bitcoin server's ip address.

thanks!

If you care to use bitcoin-qt (or bitcoind) wallet, then a simple solution is to be offline while "sending" the money.
The outgoing tx will still show up in your transaction history (as an unconfirmed one) - you can check its TxID there.
Then (still being offline) use "getrawtransaction" RPC command to get the raw transaction data.
Now use Tor to load this webpage: https://blockchain.info/pushtx
After it loads, paste the raw transaction data into the box, press the button - and voila.
And now you can get your wallet back online.

Another method is to setup the node to connect through your Tor proxy.
That should also keep safe the IP of where your spending txs originate.
The only problem is (as someone pointed out) that Tor connection is much slower, but you only need to use it while actually spending the money.
Syncing up block-chain without Tor only exposes a fact that you are running a bitcoin node, but tells them nothing about its financial activity.
newbie
Activity: 3
Merit: 0
February 01, 2014, 05:33:16 AM
#8
How about using a VPN that doesn't log traffic?  Grin
hero member
Activity: 812
Merit: 1022
No Maps for These Territories
February 01, 2014, 03:26:01 AM
#7
Yes, TOR has enough bandwidth. Lots of people use Bitcoin over TOR.

But for the initial sync I'd recommend using jgarzik's torrent and/or copying some other node's blocks. After the initial sync the bandwidth usage is small, at least if you don't run an listening hidden node.

I recommend against trying to make the client do some things over TOR and others outside of TOR. This makes it easier for third parties to correlate some way (timing analysis, ways to mark/identify your node etc).
donator
Activity: 1218
Merit: 1015
February 01, 2014, 02:10:32 AM
#6
vpn is enough? are TOR and I2P reliable enough to handle bitcoin transaction?
To hide your IP you need to run your node behind TOR. That's the only reliable way and very easy as bitcoind has native support for that. If you are paranoid and don't trust TOR on itself you could use VPN->TOR, or even VPN->TOR->VPN (though this is challenging).
Is Tor actually able to reliably handle the bandwidth needed by a full QT node anymore? I haven't used it in a long while because I remember it being unable to load anything but basic text within a reasonable amount of time. Could the QT client be reworked to receive information off un-obfuscated connections and to send through the obfuscators to help minimize load on the obfuscation services?
hero member
Activity: 812
Merit: 1022
No Maps for These Territories
February 01, 2014, 02:08:38 AM
#5
vpn is enough? are TOR and I2P reliable enough to handle bitcoin transaction?
To hide your IP you need to run your node behind TOR. That's the only reliable way and very easy as bitcoind has native support for that. If you are paranoid and don't trust TOR on itself you could use VPN->TOR, or even VPN->TOR->VPN (though this is challenging).
legendary
Activity: 1596
Merit: 1030
Sine secretum non libertas
February 01, 2014, 01:56:24 AM
#4
To answer that question, the responder would really need to know your threat model.
newbie
Activity: 59
Merit: 0
January 31, 2014, 10:17:33 AM
#3
Start by blocking traffic to well known sensor nodes.

No, even better, start by checking blockchain.info for your node's IP, and then check it for your transactions.  Odds are good that your IP has relayed tons of transactions that are not yours, and that tons of your transactions were first seen through other nodes.

Once you've got a decent idea of the reliability of the data being collected, decide if you still care enough to try hiding.  If you still do, then block connections to the sensor nodes.

do you mean it is near impossible for someone to find a reliable information about someone ip address?

so what is your suggestion, should my bitcoin server hidden behind a proxy or not?

thanks!
kjj
legendary
Activity: 1302
Merit: 1026
January 31, 2014, 08:22:48 AM
#2
Start by blocking traffic to well known sensor nodes.

No, even better, start by checking blockchain.info for your node's IP, and then check it for your transactions.  Odds are good that your IP has relayed tons of transactions that are not yours, and that tons of your transactions were first seen through other nodes.

Once you've got a decent idea of the reliability of the data being collected, decide if you still care enough to try hiding.  If you still do, then block connections to the sensor nodes.
newbie
Activity: 59
Merit: 0
January 31, 2014, 07:17:33 AM
#1
I read from here: http://bitcoin.stackexchange.com/questions/193/how-do-i-see-the-ip-address-of-a-bitcoin-transaction

that it is possible (and might be easy) to reveal bitcoin sender's ip address.

so the question is, what do you think is the best and reliable way to protect a bitcoin server's ip address.

maybe a proxy or vpn is enough? are TOR and I2P reliable enough to handle bitcoin transaction?

i'm building a bitcoin service and won't let anyone find my bitcoin server's ip address.

thanks!
Jump to: