@@ -64,7 +64,7 @@ outgoing connections, but more is possible.
64
64
65
65
In a typical situation, this suffices to run behind a Tor proxy:
66
66
67
- ./ bitcoind -proxy=127.0.0.1:9050
67
+ bitcoind -proxy=127.0.0.1:9050
68
68
69
69
` bitcoin node ` or ` bitcoin gui ` can also be substituted for ` bitcoind ` .
70
70
@@ -191,25 +191,25 @@ should be equal to binding address and port for inbound Tor connections (127.0.0
191
191
192
192
In a typical situation, where you're only reachable via Tor, this should suffice:
193
193
194
- ./ bitcoind -proxy=127.0.0.1:9050 -externalip=7zvj7a2imdgkdbg4f2dryd5rgtrn7upivr5eeij4cicjh65pooxeshid.onion -listen
194
+ bitcoind -proxy=127.0.0.1:9050 -externalip=7zvj7a2imdgkdbg4f2dryd5rgtrn7upivr5eeij4cicjh65pooxeshid.onion -listen
195
195
196
196
(obviously, replace the .onion address with your own). It should be noted that you still
197
197
listen on all devices and another node could establish a clearnet connection, when knowing
198
198
your address. To mitigate this, additionally bind the address of your Tor proxy:
199
199
200
- ./ bitcoind ... -bind=127.0.0.1:8334=onion
200
+ bitcoind ... -bind=127.0.0.1:8334=onion
201
201
202
202
If you don't care too much about hiding your node, and want to be reachable on IPv4
203
203
as well, use ` discover ` instead:
204
204
205
- ./ bitcoind ... -discover
205
+ bitcoind ... -discover
206
206
207
207
and open port 8333 on your firewall (or use port mapping, i.e., ` -natpmp ` ).
208
208
209
209
If you only want to use Tor to reach .onion addresses, but not use it as a proxy
210
210
for normal IPv4/IPv6 communication, use:
211
211
212
- ./ bitcoind -onion=127.0.0.1:9050 -externalip=7zvj7a2imdgkdbg4f2dryd5rgtrn7upivr5eeij4cicjh65pooxeshid.onion -discover
212
+ bitcoind -onion=127.0.0.1:9050 -externalip=7zvj7a2imdgkdbg4f2dryd5rgtrn7upivr5eeij4cicjh65pooxeshid.onion -discover
213
213
214
214
## 4. Privacy recommendations
215
215
0 commit comments