You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
no more then any other method of peer discovery. Its just providing peer ip
addresses over DNS.. the peers still had to have been broadcasting their
ip's so their expectation of privacy is already gone.
On Sun, Aug 23, 2015 at 1:33 PM, creativecuriosity <[email protected]
wrote:
Does the recent conversion to utilizing DNS seeds have any implications to
privacy for those users who choose to utilize socks5 proxies, such as Tor?
—
Reply to this email directly or view it on GitHub #217.
I guess she's asking about the privacy of the peer using DNS to receive the peer list, not the peers on the list.
If I'm running a node behind Tor or some other proxy, can the person providing the DNS service see my real IP address when I use his service? I don't know enough about how DNS works to answer that, but it seems plausible that they can.
There was some talk concerning Bitcoin XT and privacy issues surrounding the Tor "blacklist" that was included as a rider along-side the block size patch. I also remember a similar conversation some time ago concerning listen=0 and other DDoS related issues. Just got me thinking; thought it was import to broach the topic.
Does the recent conversion to utilizing DNS seeds have any implications to privacy for those users who choose to utilize socks5 proxies, such as Tor?
The text was updated successfully, but these errors were encountered: