Re: El Hilo del Bitcoin
Publicado: 07 Jun 2018 17:06
Cada transacción bitcoin se envía sin encriptar a los nodos bitcoin (a los llamado full nodes). Si alguien está escuchando a todas las transacciones creo que puede saber las direcciones IP del que envia bitcoins. Bitcoin usa la criptografía muy intensamente pero el blockchain no está encriptado (ni el envío de transacciones).
Pero no tengo detalles de que info se envía al enviar una transacción. Quizás es un bulo.
A posterior supongo que no es posible. El recipiente de los bitcoins es totalmente secreto mientras no haga nada con los bitcoins.
He leído que los delincuentes de la NSA crearon desde el principio de bitcoin un programa funcionando que graba absolutamente toda la info sobre el envío de bitcoins.
La mejor forma de obtener bitcoins es vender o proveer servicios y cobrar en bitcoins.
update: hoy es el día de las coindencias contigo. Según te respondo, llegó a la pagína 191 del libro Mastering Bitcoin 2ª edición.
Encrypted and Authenticated Connections
Most new users of bitcoin assume that the network communications of a bitcoin node are encrypted. In fact, the original implementation of bitcoin communicates entirely in the clear. While this is not a major privacy concern for full nodes, it is a big problem for SPV nodes.
As a way to increase the privacy and security of the bitcoin P2P network, there are two solutions that provide encryption of the communications: Tor Transport and P2P Authentication and Encryption with BIP-150/151.
Tor Transport
Tor, which stands for The Onion Routing network, is a software project and network that offers encryption and encapsulation of data through randomized network paths that offer anonymity, untraceability and privacy.
Bitcoin Core offers several configuration options that allow you to run a bitcoin node with its traffic transported over the Tor network. In addition, Bitcoin Core can also offer a Tor hidden service allowing other Tor nodes to connect to your node directly over Tor.
As of Bitcoin Core version 0.12, a node will offer a hidden Tor service automatically if it is able to connect to a local Tor service. If you have Tor installed and the Bitcoin Core process runs as a user with adequate permissions to access the Tor authentication cookie, it should work automatically. Use the debug flag to turn on Bitcoin Core’s
debugging for the Tor service like this:
$ bitcoind --daemon --debug=tor
You should see “tor: ADD_ONION successful” in the logs, indicating that Bitcoin Core has added a hidden service to the Tor network.
You can find more instructions on running Bitcoin Core as a Tor hidden service in the Bitcoin Core documentation (docs/tor.md) and various online tutorials.
Peer-to-Peer Authentication and Encryption
Two Bitcoin Improvement Proposals, BIP-150 and BIP-151, add support for P2P authentication and encryption in the bitcoin P2P network. These two BIPs define optional services that may be offered by compatible bitcoin nodes. BIP-151 enables negotiated encryption for all communications between two nodes that support BIP-151. BIP-150 offers optional peer authentication that allows nodes to authenticate each other’s identity using ECDSA and private keys. BIP-150 requires that prior to authentication the two nodes have established encrypted communications as per BIP-151.
As of January 2017, BIP-150 and BIP-151 are not implemented in Bitcoin Core. However, the two proposals have been implemented by at least one alternative bitcoin client named bcoin.
BIP-150 and BIP-151 allow users to run SPV clients that connect to a trusted full node, using encryption and authentication to protect the privacy of the SPV client.
Additionally, authentication can be used to create networks of trusted bitcoin nodes and prevent Man-in-the-Middle attacks. Finally, P2P encryption, if deployed broadly, would strengthen the resistance of bitcoin to traffic analysis and privacy-eroding sur veillance, especially in totalitarian countries where internet use is heavily controlled and monitored.
The standard is defined in BIP-150 (Peer Authentication) and BIP-151 (Peer-to-Peer Communication Encryption).
Pero no tengo detalles de que info se envía al enviar una transacción. Quizás es un bulo.
A posterior supongo que no es posible. El recipiente de los bitcoins es totalmente secreto mientras no haga nada con los bitcoins.
He leído que los delincuentes de la NSA crearon desde el principio de bitcoin un programa funcionando que graba absolutamente toda la info sobre el envío de bitcoins.
La mejor forma de obtener bitcoins es vender o proveer servicios y cobrar en bitcoins.
update: hoy es el día de las coindencias contigo. Según te respondo, llegó a la pagína 191 del libro Mastering Bitcoin 2ª edición.
Encrypted and Authenticated Connections
Most new users of bitcoin assume that the network communications of a bitcoin node are encrypted. In fact, the original implementation of bitcoin communicates entirely in the clear. While this is not a major privacy concern for full nodes, it is a big problem for SPV nodes.
As a way to increase the privacy and security of the bitcoin P2P network, there are two solutions that provide encryption of the communications: Tor Transport and P2P Authentication and Encryption with BIP-150/151.
Tor Transport
Tor, which stands for The Onion Routing network, is a software project and network that offers encryption and encapsulation of data through randomized network paths that offer anonymity, untraceability and privacy.
Bitcoin Core offers several configuration options that allow you to run a bitcoin node with its traffic transported over the Tor network. In addition, Bitcoin Core can also offer a Tor hidden service allowing other Tor nodes to connect to your node directly over Tor.
As of Bitcoin Core version 0.12, a node will offer a hidden Tor service automatically if it is able to connect to a local Tor service. If you have Tor installed and the Bitcoin Core process runs as a user with adequate permissions to access the Tor authentication cookie, it should work automatically. Use the debug flag to turn on Bitcoin Core’s
debugging for the Tor service like this:
$ bitcoind --daemon --debug=tor
You should see “tor: ADD_ONION successful” in the logs, indicating that Bitcoin Core has added a hidden service to the Tor network.
You can find more instructions on running Bitcoin Core as a Tor hidden service in the Bitcoin Core documentation (docs/tor.md) and various online tutorials.
Peer-to-Peer Authentication and Encryption
Two Bitcoin Improvement Proposals, BIP-150 and BIP-151, add support for P2P authentication and encryption in the bitcoin P2P network. These two BIPs define optional services that may be offered by compatible bitcoin nodes. BIP-151 enables negotiated encryption for all communications between two nodes that support BIP-151. BIP-150 offers optional peer authentication that allows nodes to authenticate each other’s identity using ECDSA and private keys. BIP-150 requires that prior to authentication the two nodes have established encrypted communications as per BIP-151.
As of January 2017, BIP-150 and BIP-151 are not implemented in Bitcoin Core. However, the two proposals have been implemented by at least one alternative bitcoin client named bcoin.
BIP-150 and BIP-151 allow users to run SPV clients that connect to a trusted full node, using encryption and authentication to protect the privacy of the SPV client.
Additionally, authentication can be used to create networks of trusted bitcoin nodes and prevent Man-in-the-Middle attacks. Finally, P2P encryption, if deployed broadly, would strengthen the resistance of bitcoin to traffic analysis and privacy-eroding sur veillance, especially in totalitarian countries where internet use is heavily controlled and monitored.
The standard is defined in BIP-150 (Peer Authentication) and BIP-151 (Peer-to-Peer Communication Encryption).