Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How to use Tor to send BCH in encrypted mode

2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >

Share

Shulou(Shulou.com)06/01 Report--

This article will explain in detail how to use Tor to send BCH in encrypted way, the content of the article is of high quality, so the editor will share it with you for reference. I hope you will have some understanding of the relevant knowledge after reading this article.

Tor (The Onion Router) is an implementation of the second generation of onion routing (onion routing). Users can communicate anonymously on the Internet through Tor. It is called Onion because its structure is the same as onion, you can only see its appearance, and if you want to see the core, you have to peel it off layer by layer. The project was originally sponsored by the U.S. Naval Research Laboratory. After several years of development, the Navy announced that it would no longer sponsor Tor research, but the project has not been stranded and the Tor website continues to operate. Based on the excellent encryption features of this technology, BCH users can also use this technology to increase the secrecy of their transactions by downloading Tor clients.

How Tor works

When the Bitcoin network was launched, Satoshi Nakamoto did not use the protocol anonymously, which means that the network is not private, and anyone can download the full block chain ledger to view every transaction. However, Bitcoin is also pseudo-anonymous because users can add some privacy protocols to the Bitcoin network or use privacy tools to confuse transactions, as is the case with Tor. Tor protocol is a large overlay network, which is composed of thousands of hidden nodes. If you use Tor network to send BCH,Tor protocol, although it can not hide the transaction path for you, it can increase the encrypted Internet traffic through network routing, which makes it more difficult for investigators to determine the IP address and detailed geographical location.

How to use Tor encryption

You can download the software for your host from Tor's official website (torproject.org). Tor currently supports Windows,Mac and GNU/Linux versions, and the memory size is about 64MB. Download links can be obtained directly from the website server. After downloading, the Tor program is installed and can be run directly. In addition to downloading to the host, the program can also be installed on a USB flash drive. Tor has its own web browser, which can be used to protect anonymity when surfing the Internet.

BCH all-node operators can also hide their transaction sources through the Tor network. After downloading the ABC client or other client, you can use the full node to send and receive BCH anonymously by running the Tor agent on client port 9150.

In order to use the Tor browser with the BCH full-node client, the Toe SOCK proxy host must be exactly the same by finding the advanced network settings in the Tor browser tool options, making sure that its configuration is set to 217.0.0.1 Toe SOCK 9150, and after setting up the Tor browser, adjust the network of the ABC or other clients to the same 217.0.0.1 Toe SOCK 9150 (generally found in the client's user interface).

The combined use of Tor, VPN and Tumble

Because of the publicity of the blockchain account book, the Tor protocol can not hide the original BCH address and transfer destination. Users who want to encrypt thoroughly also need the role of VPN and Tumble,VPN and Tor, which can make it more difficult for investigators to determine IP. Tumble can confuse the sender and receiver of a BCH transaction, and the combination of the three will greatly improve the confidentiality of the transaction.

Some BCH encryption tools under development

Both Bitcoin.com and Electron Cash Wallet have previously said that they are developing their own encryption tools, but the difference is that the former does not say what technology will be used, while the latter reveals that it will include Cash Shuffle plug-ins in the wallet to improve encryption by confusing transaction information. In addition to infrastructure vendors, there are some good encryption schemes in the BCH community, such as BCH mixed currency website Coinmix, which provides a special BCH mixed currency service, where you can send coins that need to be sent anonymously to Coinmix Wallet, which mixes your BCH into public money, and then you choose to send it, a process that cannot be tracked.

Criminals are not the only ones who need to encrypt their trading addresses from tracking and investigation, but so do ordinary people. Everyone has the right to protect their assets and freely control their own wealth, and BCH developers are trying to simplify this step.

On how to use Tor to send BCH encrypted way to share here, I hope the above content can be of some help to you, can learn more knowledge. If you think the article is good, you can share it for more people to see.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Internet Technology

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report