14
submitted 8 months ago by ShadowRebel@monero.town to c/monero@monero.town

In today’s episode, we discuss how to avoid being de-anonymized on Tor. Excellent episode for beginners covering the Linux distributions Whonix and Tails, the different types of virtual machines such as Oracle Virtbox, QEMU KVM, Xen/Qubes, and setting up your own Tor entrance. And the video is partially animated to make the concepts easy. Enjoy: http://video.simplifiedprivacy.com/tor/

top 3 comments
sorted by: hot top controversial new old
[-] beeng@discuss.tchncs.de 5 points 8 months ago
[-] nonono@monero.im 3 points 8 months ago

Using your own guard / relay / exit is the worst thing you can do. The most important with Tor, is to not host relays in EU, USA (including the 5 eyes alliance) & other jurisdictions allowing global surveillance & totalitarism. With a ethically good hosting service and sure this tutorial for a hardened Tor relay.

[-] ShadowRebel@monero.town -1 points 8 months ago

To clarify, it was meant to host with the geographic country restrictions you mentioned and NOT inside your home. Also to not put content on the server that is associated with your identity and pay in cryptocurrency. I hope that clarifies your objection

this post was submitted on 02 Nov 2023
14 points (81.8% liked)

Monero

1461 readers
3 users here now

This is the lemmy community of Monero (XMR), a secure, private, untraceable currency that is open-source and freely available to all.

GitHub

StackExchange

Twitter

Wallets

Desktop (CLI, GUI)

Desktop (Feather)

Mac & Linux (Cake Wallet)

Web (MyMonero)

Android (Monerujo)

Android (MyMonero)

Android (Cake Wallet) / (Monero.com)

Android (Stack Wallet)

iOS (MyMonero)

iOS (Cake Wallet) / (Monero.com)

iOS (Stack Wallet)

iOS (Edge Wallet)

Instance tags for discoverability:

Monero, XMR, crypto, cryptocurrency

founded 1 year ago
MODERATORS