<<  >> (p.64)
    Author Topic: Obyte: Totally new consensus algorithm + private untraceable payments  (Read 1236080 times)
    tonych (OP)
    Legendary
    *
    Offline Offline

    Activity: 985
    Merit: 1036


    View Profile WWW
    November 23, 2016, 03:24:35 PM
     #1261

    Hi tonych,
    Is there a way to run byteball client throw TOR (ex: a proxy settings, as bitcoin core has, to point network traffic locally to TOR)?
    I understand that byteball encrypts communications with its network (does this include communications to your servers during link bitcoin process?) but any byteball node could save user's ip (see how bitcoin explorers, ex: blockchain.info, shows originating ip for each transaction even knowing bitcoin doesn't save ip on its blockchain) and also byteball could save it during the link bitcoin process (not saying that you will, or even that if you would that you'd share it, but we all know that restricting access to malicious parties is very, very hard).
    Privacy and even anonymity is very important specially when money is involved because evil parties can do incredible harmful things with information like ip, amounts, address and etc.  Byteball may become very valuable in the future and every cautionary measure is advisable from now on.
    In order to test byteball with TOR I tried to run byteball inside whonix (it comes as two virtualbox debian linux guests with a scheme where all network communication goes only throw TOR without any special configuration) but unfortunately whonix is only available for debian 32 bits and byteball binaries for linux are only available on 64 bits (could you please think in offering it in 32 bits for linux too?).
    I also tried to run byteball inside whonix by not using your 64 bit binaries and but instead getting sources from github and installing as per yours instructions there, but after fixing some problem and have it finally installed, it didn't run ok. But I think the problem were unrelated to TOR (I will try again the whole process and come back later with more details if needed.  For now could you please tell which specific version of NW is advisable to this intent as I found instructions somewhat cryptic?).

    Unfortunately I have little experience with TOR and can't help much here, but it will be interesting if you update about your efforts to run Byteball through TOR.

    All communications are end-to-end encrypted but the IPs are visible of course. 

    Note that during linking process you do not communicate with the Transition Bot directly, you communicate through a hub, so the bot doesn't see your IP while the hub sees the IP but doesn't see the communication as it is encrypted.  Since I run both the bot and the only hub in the network, I can still match their data to determine your IP (which I'm not going to do).  Asking you to run your own hub would be too much I'm afraid.

    Yes, you can build for linux32 yourself with very little tweaking, I recommend NW.js version 0.14.7.

    Simplicity is beauty
Page 63
Viewing Page: 64