Delivery-Date: Mon, 27 Oct 2014 15:59:08 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.7 required=5.0 tests=BAYES_00,DKIM_ADSP_CUSTOM_MED,
	DKIM_SIGNED,FREEMAIL_FROM,RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID
	autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id B9B071E0BCE;
	Mon, 27 Oct 2014 15:59:06 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id B66B62F585;
	Mon, 27 Oct 2014 19:59:02 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 1438E28636
 for <tor-talk@lists.torproject.org>; Mon, 27 Oct 2014 19:58:59 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id cUSjyT3gVHZ6 for <tor-talk@lists.torproject.org>;
 Mon, 27 Oct 2014 19:58:59 +0000 (UTC)
Received: from mail-vc0-x22c.google.com (mail-vc0-x22c.google.com
 [IPv6:2607:f8b0:400c:c03::22c])
 (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits))
 (Client CN "smtp.gmail.com",
 Issuer "Google Internet Authority G2" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id E62762849A
 for <tor-talk@lists.torproject.org>; Mon, 27 Oct 2014 19:58:58 +0000 (UTC)
Received: by mail-vc0-f172.google.com with SMTP id lf12so2872114vcb.3
 for <tor-talk@lists.torproject.org>; Mon, 27 Oct 2014 12:58:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
 h=mime-version:in-reply-to:references:date:message-id:subject:from:to
 :cc:content-type;
 bh=Dh5mMOPpov/p7N+Rt5KaXUBpfKKnVd33uz781FFXn8A=;
 b=sT0MHAXOhB6xI353PNiDbb7j31DSexLaB0ESUO4bCYnJC9v4SK3dQLx+vRILhUP2+O
 swQ5LfTQwl+q4KvQYOXPcqDlIj+IGcce65ztszVlU7fCIHZc5N9BfLbdiSpCzHMmqz0v
 T+ooTaQCe5/HvlNeQLWRKMlNszIznKgdBvrFBHk72IoasSlqAHbowYq4d8duTcl3J1Fl
 pB/ulun/GcjfopPjvkfSdJUiNOhS6FwSN6g/wvWwE4OnpBtxVdkWXxsLI4UPdXECSgfK
 U6pLXpf3V1mwynCSFz1DIWQaDU91uUA8IKm/Ve3aQH2mOeI73VHrl4mOH13hNXEIoXLP
 3b2A==
MIME-Version: 1.0
X-Received: by 10.221.63.8 with SMTP id xc8mr1803946vcb.37.1414439936388; Mon,
 27 Oct 2014 12:58:56 -0700 (PDT)
Received: by 10.221.64.74 with HTTP; Mon, 27 Oct 2014 12:58:56 -0700 (PDT)
In-Reply-To: <20141024103527.fd3ac8eff8862bf101b45d95@mega-nerd.com>
References: <20141023191048.17a50660@meilong>
 <20141023232921.GF21428@torproject.org>
 <20141024103527.fd3ac8eff8862bf101b45d95@mega-nerd.com>
Date: Mon, 27 Oct 2014 15:58:56 -0400
Message-ID: <CAD2Ti2_QWc1Xq+uTvmurFLqjLVsSACMYYDzTAs7zk5SWyQE7Cw@mail.gmail.com>
From: grarpamp <grarpamp@gmail.com>
To: tor-talk@lists.torproject.org
Cc: cypherpunks@cpunks.org
Subject: Re: [tor-talk]
	=?utf-8?q?Bitcoin_over_Tor_isn=E2=80=99t_a_good_idea_?=
	=?utf-8?q?=28Alex_Biryukov_/_Ivan_Pustogarov_story=29?=
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On Thu, Oct 23, 2014 at 7:35 PM, Erik de Castro Lopo
<mle+tools@mega-nerd.com> wrote:

http://arxiv.org/pdf/1410.6079v1.pdf

> Could this situation be improved if people ran limited exit nodes that only
> alloed the bitcoin p2p protocol to exit? I for one don't have enough

There are about ten exit nodes that do only this today.
[One of which is run by Mike Hearn who has advocated building in
censorship capabilities to Tor, and blocking (historically) tainted coins
(such as you have now or might receive through otherwise completely
innocent transactions with you, or from your own trans/mixing with
others).]

Then there is question if your client will select such 'only *coin' nodes
versus those with high bandwidth and open exit policies.

There are also a fair number of hidden services in Tor/I2P/CJDNS
that act as bitcoin nodes.

As related tangent, yes, the bitcoin protocol needs to be encrypted
on the wire, at least bitcoin node to bitcoin node with TLS, obviously
and urgently so, particularly if you wish to guard your trans from
wire listeners.

You might be best to in fact run bitcoin always and entirely over Tor,
especially while transacting.
But then also routinely compare that received blockchain to one
you receive via alternate/trusted sources, such as clearnet or signed
bittorrent checkpoints.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

