12
submitted 2 months ago* (last edited 2 months ago) by prancing389@monero.town to c/monero@monero.town

Nihilist puts out another very informative article, great work!

you are viewing a single comment's thread
view the rest of the comments
[-] nihilist@monero.town 4 points 2 months ago* (last edited 2 months ago)

if you run your own node, it means that the adversary needs to come and ask you directly to give you the details of who connected to the node. and if you keep Tor in between you and your own node, you're maintaining anonymity aswell.

if others find your (remote) node its not changing anything, you're making it available for them to use monero

but still they should run their own monero node to keep decentralizing further

[-] roboto@feddit.org 1 points 2 months ago

Alright got it, but regarding TOR aren’t there also vulnerabilities with compromised exit nodes? I feel like once you go down the rabbit hole of trying to achieve true anonymity there’s always another layer of complications if you wanna do things right.

this post was submitted on 07 Sep 2024
12 points (100.0% liked)

Monero

1663 readers
24 users here now

This is the lemmy community of Monero (XMR), a secure, private, untraceable currency that is open-source and freely available to all.

GitHub

StackExchange

Twitter

Wallets

Desktop (CLI, GUI)

Desktop (Feather)

Mac & Linux (Cake Wallet)

Web (MyMonero)

Android (Monerujo)

Android (MyMonero)

Android (Cake Wallet) / (Monero.com)

Android (Stack Wallet)

iOS (MyMonero)

iOS (Cake Wallet) / (Monero.com)

iOS (Stack Wallet)

iOS (Edge Wallet)

Instance tags for discoverability:

Monero, XMR, crypto, cryptocurrency

founded 1 year ago
MODERATORS