Use IP anonymization system-tor

in anonymization •  4 years ago 

Content

Users are just ordinary people who want to protect them from being tracked on the network, that is, the network IP is anonymous, so this is a better solution for others who want to find the source of the transaction. Of course there may be more Appropriate solution (because this solution still has certain limitations, such as low latency, but Bitcoin is a high latency, so there is a little conflict here, among which the mixed currency network is a possible alternative solution)

There are several considerations when using the Tor system to implement a solution to the anonymization of the network layer for Bitcoin. First of all, there may be some complicated interactions between Tor's protocol and any upper-layer protocol based on this protocol, which may lead to new methods of destroying anonymity. In fact, researchers have discovered that there are some potential security issues when using Bitcoin on top of the Tor protocol. You must be very careful when using this solution. Secondly, there may be other anonymous communication technologies that are more suitable for the use of Bitcoin. Tor is positioned for low-latency activities, such as web browsing. When browsing the web, you don’t want to sit there and wait for a long time, so to achieve low latency, you may have to make some sacrifices in terms of anonymity. In contrast, Bitcoin is a high-latency system, because Bitcoin transactions take time to obtain confirmation on the blockchain. Therefore, at least in theory, we may prefer to use another alternative to achieve anonymity, such as Mix Net (see section 6.3 of this chapter). But for now, as a system that is actually running and has a large user base, Tor still has some advantages, and the security issues of these users have been intensively studied.

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!