Michail1 2017-01-12 05:45:18
Chillum - Or, in the very least, logged for later reading.
Chillum 2017-01-12 05:46:06
you could setup a box with a full node and connect it to the internet via whonix, this would give you a tor protected full node
Chillum 2017-01-12 05:46:25
this would be the more private
Chillum 2017-01-12 05:47:10
but you might want to do your initial sync over the plain internet as tor is slow and does not need a lot of traffic on it
Michail1 2017-01-12 05:52:16
use an extra rpi to create your own cheap wifi tor router for your privacy concerns.
wickerman 2017-01-12 05:53:26
Chillum: understood, but what is whonix? cant's I just use tor configured bitcoin core ?
Chillum 2017-01-12 05:53:52
you can just configure tor for bitcoin, but make sure you get all the details right
Chillum 2017-01-12 05:54:04
whonix is an internet gateway that puts everything through tor
Chillum 2017-01-12 05:54:12
not even the systems using it know their own IP
Chillum 2017-01-12 05:54:38
the idea being that even if something goes wrong and the computer tries to do something that owuld reveal its IP it can't
wickerman 2017-01-12 05:54:43
understood
Chillum 2017-01-12 05:54:49
or if someone hacks root access they still won't know where you are
Chillum 2017-01-12 05:55:33
DNS is the big thing people forget when setting up TOR, but since you will only be connecting to bitcoin nodes such an oversight would only reveal you are using bitcoin
Chillum 2017-01-12 05:55:49
unless the attacker runs that node
wickerman 2017-01-12 06:00:16
Chillum: since its an OS does it mean I have to install it in and independent partition and boot it as an independent OS or can I just install it in a windows instance?
Chillum 2017-01-12 06:00:34
whonix? It is installed on its own machine generally
Chillum 2017-01-12 06:00:51
I have heard of people doing it with VMs, but that is a compromise in safety
Chillum 2017-01-12 06:01:30
you probably will be fine with just setting up TOR for your node manually, whonix may be overkill depending on your needs
wickerman 2017-01-12 06:01:39
Chillum: why is there a "windows" download option? it requires windows or another OS to run?
Chillum 2017-01-12 06:02:34
I don't know, windows and security are at odds with each other
Chillum 2017-01-12 06:02:43
I think it is suggesting virtualbox to run under windows
Chillum 2017-01-12 06:03:11
ya, if you click on windows it gives intructions for running virtualbox lol
Chillum 2017-01-12 06:03:28
it is its own linux based OS
wickerman 2017-01-12 06:04:44
now I understand, I could boot it separately from another epartition or HD
wickerman 2017-01-12 06:04:51
*partition
wickerman 2017-01-12 06:05:01
instead of a VM
Chillum 2017-01-12 06:05:05
yes
wickerman 2017-01-12 06:06:08
and I couçd encrypt the data in the hd it is so an attacked could not access the data even if I am running an exposed windows instante
wickerman 2017-01-12 06:06:18
*attacker
wickerman 2017-01-12 06:06:49
but as you said regular TOR is probably just enough for me
Chillum 2017-01-12 06:08:11
wickerman: yes
wickerman 2017-01-12 06:08:11
it's not like I will be in human trafficking activities
Chillum 2017-01-12 06:08:29
if you are doing human trafficking you probably want something more robust like whonix
Chillum 2017-01-12 06:08:47
depends if your adversaries are state actors or have similar amounts of resources
wickerman 2017-01-12 06:10:30
my enemy would always be the state
wickerman 2017-01-12 06:11:56
everything I research about privacy and anonimality is to avoid state
wickerman 2017-01-12 06:12:37
one of the worst things that can happen for an individual is that the state know what he has
wickerman 2017-01-12 06:12:47
knows
Pilate 2017-01-12 06:13:25
in ted nugent land maybe
Chillum 2017-01-12 06:13:38
they are recording everything, in 10-20 years they will probably be able to go over recordings and decode all the tor traffic and who did it
wickerman 2017-01-12 06:16:18
Chillum: how do you know that?
Chillum 2017-01-12 06:18:17
I don't know it, but it is a reasonable security assumption
Chillum 2017-01-12 06:18:31
even if they don't break the underlying encryption they may find a fault in the implementation
Chillum 2017-01-12 06:18:34
as they have in the past
Chillum 2017-01-12 06:19:06
we know they are recording
wickerman 2017-01-12 06:19:22
so the only way to be safe is that they cease to exist
Chillum 2017-01-12 06:19:34
even the military rates its encryption methods by how many years they expect them to be secure, they never assume they will last forever
Chillum 2017-01-12 06:20:03
whispering in a field to each other without any electronics is probably still safe
Chillum 2017-01-12 06:20:40
at least until they get the big ear in the sky working
wickerman 2017-01-12 06:22:27
it's funny that the state became a kind of ever watching super AI whose purpose is to violate as much people as possible, everything under the name of "democracy"
root____4 2017-01-12 06:27:43
hi
root____4 2017-01-12 06:28:01
the end is near
root____4 2017-01-12 06:28:03
be awate
root____4 2017-01-12 06:28:04
aware
root____4 2017-01-12 06:28:12
and just wait for your fate
root____4 2017-01-12 06:28:39
exit
root____4 2017-01-12 06:28:42
quit
abracadab 2017-01-12 06:29:38
lol @ exit and quit
trotski2000 2017-01-12 06:32:31
wickerman: I do use Core via Tor and only via Tor
mod_cure 2017-01-12 06:42:13
Hi All, about block chain forking.. i have my fork which is invalid and the new fork that is the longest chain. bitcoin will create a branch and store my entire chain. then start from stratch and gets all the new blocks from the new fork longest chain ? is this what chain converge does?
abpa 2017-01-12 06:43:34
What makes your fork invalid?
mod_cure 2017-01-12 06:44:34
abpa, since its not the longest chain?