Skip to content

Commit 8e4a0dd

Browse files
committed
torcontrol: Add comment explaining Proxy credential randomization for Tor privacy
Signed-off-by: Eval EXEC <[email protected]>
1 parent ec5c0b2 commit 8e4a0dd

File tree

1 file changed

+5
-1
lines changed

1 file changed

+5
-1
lines changed

src/torcontrol.cpp

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -403,7 +403,11 @@ void TorController::get_socks_cb(TorControlConnection& _conn, const TorControlRe
403403

404404
Assume(resolved.IsValid());
405405
LogDebug(BCLog::TOR, "Configuring onion proxy for %s\n", resolved.ToStringAddrPort());
406-
Proxy addrOnion = Proxy(resolved, true);
406+
407+
// With m_randomize_credentials = true, generates unique SOCKS credentials per proxy connection (e.g., Tor).
408+
// Prevents connection correlation and enhances privacy by forcing different Tor circuits.
409+
// Requires Tor's IsolateSOCKSAuth (default enabled) for effective isolation (see IsolateSOCKSAuth section in https://2019.www.torproject.org/docs/tor-manual.html.en).
410+
Proxy addrOnion = Proxy(resolved, /*_randomize_credentials=*/ true);
407411
SetProxy(NET_ONION, addrOnion);
408412

409413
const auto onlynets = gArgs.GetArgs("-onlynet");

0 commit comments

Comments
 (0)