Blockchair's block explorers are now available on the Tor network!steemCreated with Sketch.

in blockchair •  5 years ago 

After supporting block explorers for privacy coins, such as Dash and Monero, Blockchair is now available on the Tor network. The website works without JavaScript and third-party trackers to protect user’s privacy in the best possible way. From now on, users can enjoy an extra layer of security while searching for data stored in blockchains.

Blockchair follows a strict privacy policy and only collects anonymous aggregated data that allows improving the website features. They specifically state not to be using CDN providers (including those used to distribute JavaScript libraries and styles), third-party web analytics tools, hit counters, cookies that can be used to identify users and other third-party site elements. When users leave the website, their browser won’t send HTTP referer headers. This means that users can navigate to other sites without their browsing activity being traced by those sites.

Ordinarily, a cryptocurrency address page is only visited by the address owner, while the transaction page is visited by the transacting parties. Therefore, it would be easy for a third party to make up a profile of the user and his approximate crypto holdings, based on the visited URLs. If such information becomes public knowledge, those users are likely to be targeted by cybercriminals. Users of Blockchair do not run this risk.

Blockchair provides explorers for 13 different blockchains in a privacy concerning manner. For the onion v3 version, users can use blkchairbknpn73cfjhevhla7rkp4ed5gg2knctvv7it4lioy22defid.onion and for the legacy version blockchairt5d4pj.onion. The Tor domain addresses can be verified in the footer of the regular website in the ‘Crypto-anarchist corner’.

About the Tor network
Tor is free and open-source software that enables anonymous communication by directing internet traffic through a free worldwide volunteer overlay network that consists of more than 7000 relays to conceal a user’s location and usage from anyone conducting network surveillance or traffic analysis. Tor's intended use is to protect the personal privacy of its users, as well as their freedom and ability to conduct confidential communication by keeping their internet activities unmonitored.

twitter_onion.png

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!