Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Crypto

Bitcoin Apps Soon To Run On Tor Anonymity Network

Paul Anderson by Paul Anderson
March 8, 2014
in Crypto, Technology News
0
bitcoin tor network
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Bitcoin and Tor have grown to be possibly the two most favored programs for maintaining privacy on the net.  Developers are not looking to mend the two together making the Bitcoin network significantly stealthier.

You might also like

ChipMixer platform tied to crypto laundering scheme – seized by authorities

$1 Million+ USD stolen from Algorand users

$6 million Rewarded by Aurora Labs to Hacker who saved 70,000 ETH

Bitcoin’s primary developer, Mike Hearn claims that a future version of Bitcoinj, the program that powers many Bitcoin apps including Multibit, Hive, and Android Wallet, will route all connections via Bitcoin network over Tor’s anonymity network. When users of these apps buy or sell Bitcoins, their transactions are going to be sent through Tor’s system of three encrypted hops through computers all over the world before they reach the final Bitcoin node.

Hearn, who also works at Google as a engineer, states that he developed a prototype of the Tor-enabled Bitcoin software in January. An additional well-known Bitcoin developer who calls himself “devrandom” is trying to have the integration available to the public in around a month, Hearn added. When it’s launched, Hearn suggests the Tor upgrade to Bitcoin will depict a significant improvement on the privacy of Bitcoin’s deals.

“The fact I use Bitcoin isn’t a secret, but I don’t want all my transactions in an NSA database,” Hearn says. “When I use Bitcoin in a bar, I don’t want someone on the local network to learn my balance. The way Bitcoin is used today, both those things are possible.”

Apart from the record of Bitcoin trades saved on the blockchain, any individual capturing Internet traffic may also track the origin of a Bitcoin payment back to the IP address where it came from. As a result of that IP tracking, it’s “possible that the NSA and GCHQ have de-anonymized most of the blockchain by now,” Hearn adds.

Tags: BitcoinCryptocurrencytor
Share30Tweet19
Paul Anderson

Paul Anderson

Editor and chief at ZeroSecurity. Expertise includes programming, malware analysis, and penetration testing. If you would like to write for ZeroSecurity, please click "Contact us" at the top of the page.

Recommended For You

ChipMixer platform tied to crypto laundering scheme – seized by authorities

by Paul Anderson
March 17, 2023
0
ChipMixer platform tied to crypto laundering scheme – seized by authorities

A coalition of law enforcement agencies from Europe and the United States have announced the successful takedown of ChipMixer, an unlicensed cryptocurrency mixer that has been operating since...

Read more

$1 Million+ USD stolen from Algorand users

by Kyle
February 22, 2023
0
$1 Million+ USD stolen from Algorand users

On Monday evening, the Twitter account Algo Surf reported that several Algorand accounts had been hacked, with at least three users losing significant amounts of funds. The value...

Read more

$6 million Rewarded by Aurora Labs to Hacker who saved 70,000 ETH

by Paul Anderson
June 14, 2022
0
Aurora Labs awards $6 Million dollar bug bounty

According to a recent report, Aurora Labs has paid a total of 6 million USD to Pwning.eth. Pwning.eth, an ethical hacker, discovered a serious vulnerability in Aurora's network...

Read more

WatchDog’s new multi-stage cryptojacking attack unsurfaced

by Christi Rogalski
June 11, 2022
0
WatchDog Targets Docker Containers

Cado Security’s honeypot has recently captured a rather interesting cryptojacker from what they believe to be the WatchDog hacking group. They note that although the attack’s life cycle...

Read more

Megaupload Plans to Return After 5 Years

by Paul Anderson
July 15, 2016 - Updated on May 26, 2022
0
Megaupload Plans to Return After 5 Years

The huge file-sharing website, Megaupload is scheduled to relaunch, five years after being raided and shut down by the FBI. After its owner, Kim Dotcom, was detained and...

Read more
Next Post
New banking Trojan IntelCrawler hits Islamic Mobile Bank users

New banking Trojan IntelCrawler hits Islamic Mobile Bank users

Related News

NSA intercepting U.S. Routers

NSA intercepting U.S. Routers

June 6, 2014 - Updated on March 17, 2023
Netwire RAT seized by FBI and other worldwide police agencies

Netwire RAT seized by FBI and other worldwide police agencies

March 16, 2023
The Emotet botnet returns and is sending a slew of malicious emails

The Emotet botnet returns and is sending a slew of malicious emails

March 14, 2023
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology News
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Tools
  • Contact Us
  • Privacy Policy

© 2022 ZeroSecurity, All Rights Reserved.