Pages:
Author

Topic: why are people trying to hide their IP? (Read 2321 times)

legendary
Activity: 1042
Merit: 2805
Bitcoin and C♯ Enthusiast
August 12, 2016, 09:05:56 AM
#22
this topic is turning into repetitive replies from signature campaigns.

i will lock it, if you feel like there is more to discuss here and want me to unlock the topic just send me a PM.

unlocked cause of a couple of requests!
member
Activity: 67
Merit: 10
August 12, 2016, 07:40:35 AM
#21
they hiding their ip i think they doing illegal things or maybe they doing something or tricks to earn faster.
full member
Activity: 224
Merit: 100
August 12, 2016, 06:46:18 AM
#20
I recently read on RT that TOR is no longer safe since CIA was able to bribe one of the developers. I never used it to be honest but that must be nasty  Undecided

the way TOR works is that you go through a series of nodes and your communication encrypts another time on each jump until you reach your destination. so unless CIA or any other agency is controlling all or majority of the TOR exit nodes i don't see how they can control it!

besides there are much easier techniques to find you real IP address without needing to do any of the above stuff.

p.s. my question here was a mere curiosity to learn more about bitcoin and find out what information i am broadcasting when sending a tx.

I think most of the internet users have no idea about what IP is!

lol, that's true. and also too lazy to google.

Hmf? Yeah, the reason is that they are making like illegal transactions that they need to hide their IP by using softwares or TOR to hie their IP. While some uses it to avoid hacking. Especially if you have lots of BTC stored in your wallet and you are not careful with your transactions. They may turn into bubbles in an instant, so it is recommended to hide your IP if your are suspecting that your transactee is not trusted.
legendary
Activity: 1042
Merit: 2805
Bitcoin and C♯ Enthusiast
August 12, 2016, 12:37:40 AM
#19
I recently read on RT that TOR is no longer safe since CIA was able to bribe one of the developers. I never used it to be honest but that must be nasty  Undecided

the way TOR works is that you go through a series of nodes and your communication encrypts another time on each jump until you reach your destination. so unless CIA or any other agency is controlling all or majority of the TOR exit nodes i don't see how they can control it!

besides there are much easier techniques to find you real IP address without needing to do any of the above stuff.

p.s. my question here was a mere curiosity to learn more about bitcoin and find out what information i am broadcasting when sending a tx.

I think most of the internet users have no idea about what IP is!

lol, that's true. and also too lazy to google.
hero member
Activity: 761
Merit: 606
August 11, 2016, 04:08:59 PM
#18
I recently read on RT that TOR is no longer safe since CIA was able to bribe one of the developers. I never used it to be honest but that must be nasty  Undecided
Well, then all the dark markets must be run by CIA. Smiley

@Coding Enthusiast, hiding the IP is mostly about hiding the origin of txs and/or new blocks (if you're a miner).
Less commonly, you might want to hide just the fact that you use bitcoin at all.


In addition to concealing IP's as I stated a few posts above this, there is substantial security to running 100% TOR.  Lacking exit nodes, an evil node at the end doesn't exist.  Further; using Electrum as an "example provider" of several full TOR access blockchain servers, you can gain some confidence that integrity exists in the destination.  I realize many internet users are clueless, but then again those active in the BTC environment should/could be advanced in computer literacy.  This investment/hobby can be fully safe, and if you are moving substantial coin volume how could you not take the time to learn this stuff?  I have written a small "paper" that I will be sending to SatoshiLabs describing why I would like to see them configure a full TOR hidden server to protect Trezor users, without relying upon third party software.  "Third party" requires continual tweaking to accommodate some Trezor firmware updates.  Hidden server (even if the actual location is physically known) technology removes an incredible amount of risk.  It virtually takes a "state level actor" to interfere with such traffic.  Granted, TOR is not end all be all.  A reasonable partition of trust may include vpn chains prior to the TOR channels.
legendary
Activity: 3276
Merit: 2442
August 11, 2016, 03:47:52 PM
#17
They want privacy. It is not that hard to understand i think. Everything you do on the internet have an information about you. 3rd party companies or governments can collect those informations and they can use it against you when the time comes. They can collect data about your sexual preferrings, which type of porns you like, which movies/programs you pirate, which political views you have etc etc. Why would i make myself a target?
full member
Activity: 224
Merit: 100
August 11, 2016, 03:34:02 PM
#16
I think most of the internet users have no idea about what IP is!

Thats not true IP is one of the most common thing in the internet world and most of the people who use internet would definetily know about what IP is.Specially nowdays users are not that dumb that they dont know even about the IP.If they dont know about IP then probably they also dont know how to use internet.

Most people have some one come link up their internet and explain the basics of how to get on. After that most people do not look any farther into connection.
full member
Activity: 196
Merit: 100
August 11, 2016, 03:26:18 PM
#15
I think most of the internet users have no idea about what IP is!

Thats not true IP is one of the most common thing in the internet world and most of the people who use internet would definetily know about what IP is.Specially nowdays users are not that dumb that they dont know even about the IP.If they dont know about IP then probably they also dont know how to use internet.
member
Activity: 78
Merit: 10
August 11, 2016, 03:10:45 PM
#14
I think most of the internet users have no idea about what IP is!

IP is a new coin  Grin
sr. member
Activity: 265
Merit: 250
August 11, 2016, 11:50:54 AM
#13
I think most of the internet users have no idea about what IP is!                                                                                                                                                   
legendary
Activity: 2053
Merit: 1356
aka tonikt
August 11, 2016, 11:10:29 AM
#12
I recently read on RT that TOR is no longer safe since CIA was able to bribe one of the developers. I never used it to be honest but that must be nasty  Undecided
Well, then all the dark markets must be run by CIA. Smiley

@Coding Enthusiast, hiding the IP is mostly about hiding the origin of txs and/or new blocks (if you're a miner).
Less commonly, you might want to hide just the fact that you use bitcoin at all.
member
Activity: 99
Merit: 10
August 11, 2016, 10:03:28 AM
#11
I recently read on RT that TOR is no longer safe since CIA was able to bribe one of the developers. I never used it to be honest but that must be nasty  Undecided
sr. member
Activity: 434
Merit: 250
August 10, 2016, 05:11:44 PM
#10
There are several companies performing sybil attacks on the network.  

Companies or government agencies?
Do you have any sources for this? This is really scary and interesting at the same time.
What would these people have to gain from this? Learning the IP address a BTC transaction is coming from?
staff
Activity: 4284
Merit: 8808
August 10, 2016, 05:05:16 PM
#9
There are several companies performing sybil attacks on the network.  They connect to every node they can reach (the 8 limit is for _outbound_ connections) and also listening to connections, running many fake nodes so that it is likely that you will connect to them. They also monitor the timing of addr messages to attempt to infer which addresses are connected to the nodes they are connected to.

By monitoring the timing of transaction announcements they can learn a lot about transaction origins, especially if addresses are reused.


As far as i understand, it's even a bad idear to use bitcoin and tor:
This is highly misleading. The claim is that attackers can DOS attack tor exits, causing a tor using Bitcoin user to potentially need to stop using Tor during a DOS attack.

This is untrue because normally with tor Bitcoin nodes are connecting to other bitcoin nodes as hidden services, no exit is involved... and not very relevant because, "maybe tor gets DOS attacked and you need to either wait or switch it off" is in no way worse than never using tor in the first place.
hero member
Activity: 761
Merit: 606
August 10, 2016, 02:27:21 PM
#8
I would like to add my reasoning and therefore answer the OP's original post in this thread from my perspective.  Firstly, I understand the posts above this on this thread.  I am not a connectivity newbie, just new to posting here.  I am one of those that rely upon maintaining some anonymity.  I am a privacy buff and I really don't want folks to know that my "real name" collects and uses BTC.  In some parts of the world BTC raises red flags, which causes some concerns.  No, its not illegal where I am, but still it draws attention.  Over time I expect that to change, but until then I keep things on the private side.  I do spend coins on things where I can maintain privacy, e.g. vpns, etc...  I am also in a position where I can acquire coins somewhat anonymously, which I do.  If coins become tainted I take care of that too.  Regarding TOR its ultimate security if its 100% hidden service nodes like Electrum or others offer.  You don't have to worry as much over being "picked off" in route by not ever using an exit node.  To me this perspective makes great sense and provides a measure of personal security for as an example early adopters with considerable wallets.  The reverse of this would be my name is "John Smith" (obvious example) and I own 5000 bitcoins.  That would be a dangerous revelation where I live.  This is my personal answer to the OP, while many here may differ you are free to do so.
copper member
Activity: 2996
Merit: 2374
August 10, 2016, 11:58:23 AM
#7
From what I can tell using SSL will use a very small amount of additional resources (several other stack threads with similar info were found) to connect to a peer for the first time, to transfer data between your peer, and to reestablish a connection to a known peer. If you multiply this neglible effect times 100 connections that a full node might have, the effects would be greater (obviously).

Even though the resources required is very low, running a full node generally will not generate any revenue (at least not running a full node alone), so costs of running a full node need to be kept as low as possible without having any unnecessary costs.

As pointed out above, SSL will really not protect your node from any kind of attack, and your full node will give whatever information that is encrypted to any node that asks provided that your node has an available "spot" for an additional connection.
legendary
Activity: 3472
Merit: 4801
August 10, 2016, 08:43:39 AM
#6
i always thought the traffic between the nodes is also encrypted!

Perhaps someone else will stop by and confirm for us, but I'm pretty sure it isn't.

is there any particular reason for not using a simple SSL encryption for this?

Extra load on the node with minimal benefit?

this may be a little far fetched but isn't there a possibility of a man in the middle attack?

That depends on what you mean by "man in the middle attack".  it is a decentralized peer-to-peer network.  You only ever connect directly to peers, and if someone were to try to get "in the middle" that would just mean that they are yet another peer.  Your node doesn't trust ANYTHING that it receives from any peer.  It verifies everything.  Since every peer that you connect to is connected to other peers besides you, they are ALL essentially "in the middle" between you and the rest of the network.  Anything that any node could do with the unencrypted data, they could also do with encrypted data (since it would be data that they could necessarily decrypt).

There are, however, isolation attacks.  This would be possible regardless of whether the communications between you and your connected peers were encrypted.  In an isolation attack, an attacker would make sure that they are running ALL of the nodes that your peer connects to.  Then your ONLY view of the network is what they allow you to see.  In this situation, they could send you one transaction directly (making you think you got paid with a valid unconfirmed transaction) and send a completely different transaction to the rest of the network (one that pays themselves instead of you).  If they have enough hash power, they might even be able to solve a block or two to convince you that the transaction they sent you is confirming (while the rest of the network creates many more blocks without your transaction).


i don't know what an attacker can gain from doing this except messing with one node but that is the first thing that comes to my mind with an un-encrypted communication.

Like I said, since your node is communicating directly with the attacker's node, anything they could do with un-encrypted communication they could also do with encrypted communication.
staff
Activity: 3458
Merit: 6793
Just writing some code
August 10, 2016, 08:41:52 AM
#5
thanks for the explanation

If the person that wants to track you can monitor all traffic both to and from your IP without actually connecting to your node, then they can see every time you send a transaction without first receiving it.

i always thought the traffic between the nodes is also encrypted! is there any particular reason for not using a simple SSL encryption for this?
No the traffic is not encrypted (yet). There is a BIP for encrypting this traffic, but it has not yet been implemented. As for why SSL isn't used, I don't know.

this may be a little far fetched but isn't there a possibility of a man in the middle attack? i don't know what an attacker can gain from doing this except messing with one node but that is the first thing that comes to my mind with an un-encrypted communication.
No. Because of the signatures in a transaction, a man-in-the-middle attack can't do much. The attacker can't do much and can't change anything in transactions or blocks.
legendary
Activity: 1042
Merit: 2805
Bitcoin and C♯ Enthusiast
August 10, 2016, 08:16:18 AM
#4
thanks for the explanation

If the person that wants to track you can monitor all traffic both to and from your IP without actually connecting to your node, then they can see every time you send a transaction without first receiving it.

i always thought the traffic between the nodes is also encrypted! is there any particular reason for not using a simple SSL encryption for this?

this may be a little far fetched but isn't there a possibility of a man in the middle attack? i don't know what an attacker can gain from doing this except messing with one node but that is the first thing that comes to my mind with an un-encrypted communication.
legendary
Activity: 3472
Merit: 4801
August 10, 2016, 07:41:43 AM
#3
transactions and blockchain is not recording any IP.

Correct.

"finding the source is hard"

Correct.

i can not understand how it can even be possible to find the source

It is possible in some situations. It depends on who you are trying to hide from and what they are capable of monitoring.

unless the person who wants to log IPs is either connected to you and watching you or connected to every single Full Node to log all IPs when first sees the transaction being broadcast from a source which i don't think is even possible.

And that is why it is hard.

If the person that wants to track you can isolate your peer by preventing it from connecting to any other nodes, and then connects to your node directly themselves, then they will see (and can log) every transaction that you send before they relay it to the rest of the network.

If the person that wants to track you can connect to a very VERY large number of nodes (including you), then every time that you are the first node to send them a transaction, they will know that there is a good chance that you created that transaction.

If the person that wants to track you can monitor all traffic both to and from your IP without actually connecting to your node, then they can see every time you send a transaction without first receiving it.

besides a normal client is connected to max 8 peers (right?)

No.

That is the default maximum number of outgoing connections that your node will establish.  As long as your node isn't inaccessible from the internet, it will accept additional incoming connections from other nodes.
Pages:
Jump to: