[Bitcoin-development] Abnormally Large Tor node accepting only Bitcoin traffic
s7r at sky-ip.org
Mon Jul 28 16:13:19 UTC 2014
-----BEGIN PGP SIGNED MESSAGE-----
On 7/28/2014 5:08 PM, Gregory Maxwell wrote:
> On Mon, Jul 28, 2014 at 5:31 AM, Robert McKay <robert at mckay.com>
>> I don't think Sybil attack is the right term for this.. there is
>> only one IP address.. one "identity".
> The bitcoin protocol is more or less identityless. It's using up
> lots of network capacity, "number of sockets" is as pretty close as
> you get.
>> I'm not even sure that this behaviour can be considered abuse..
>> it's pretty much following the rules and maybe even improving the
>> transaction and block propagation.
> It isn't relaying transactions or blocks as far as anyone with a
> connection to it can tell.
> and sure, probably not much to worry about— people have been
> running spy nodes for a long time, at least that much is not new.
> Build stunning WinForms apps today! Reboot your WinForms
> applications with our WinForms controls. Build a bridge from your
> legacy apps to the future.
> Bitcoin-development mailing list
> Bitcoin-development at lists.sourceforge.net
gmaxwell - I wanted to ask you a non-expert question. Let's say I use
my bitcoin-qt on my laptop with Tor, and send some BTC or receive
some, what can my Tor exit node see / do / harm? He can alter the
content, by modifying and transmitting invalid transactions to the
network but this will have no effect on me, e.g. can't steal coins or
send them on my behalf or intercept my payments, right? It's not clear
for me what data would such a node see? Why would you spend money to
setup a spy node for this what relevant data can it give you?
PGP Fingerprint: 7C36 9232 5ABD FB0B 3021 03F1 837F A52C 8126 5B11
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (MingW32)
-----END PGP SIGNATURE-----
More information about the bitcoin-dev