You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: doc/tor.md
+21-18
Original file line number
Diff line number
Diff line change
@@ -1,16 +1,19 @@
1
-
TOR SUPPORT IN BITCOIN
2
-
======================
1
+
TOR SUPPORT IN DARKCOIN
2
+
=======================
3
3
4
-
It is possible to run Bitcoin as a Tor hidden service, and connect to such services.
4
+
It is possible to run Darkcoin as a Tor hidden service, and connect to such services.
5
5
6
-
The following directions assume you have a Tor proxy running on port 9050. Many distributions default to having a SOCKS proxy listening on port 9050, but others may not. In particular, the Tor Browser Bundle defaults to listening on a random port. See [Tor Project FAQ:TBBSocksPort](https://www.torproject.org/docs/faq.html.en#TBBSocksPort) for how to properly
7
-
configure Tor.
6
+
The following directions assume you have a Tor proxy running on port 9050. Many
7
+
distributions default to having a SOCKS proxy listening on port 9050, but others
8
+
may not. In particular, the Tor Browser Bundle defaults to listening on a random
9
+
port. See [Tor Project FAQ:TBBSocksPort](https://www.torproject.org/docs/faq.html.en#TBBSocksPort)
10
+
for how to properly configure Tor.
8
11
9
12
10
-
1. Run bitcoin behind a Tor proxy
11
-
---------------------------------
13
+
1. Run darkcoin behind a Tor proxy
14
+
----------------------------------
12
15
13
-
The first step is running Bitcoin behind a Tor proxy. This will already make all
16
+
The first step is running Darkcoin behind a Tor proxy. This will already make all
14
17
outgoing connections be anonymized, but more is possible.
15
18
16
19
-socks=5 SOCKS5 supports connecting-to-hostname, which can be used instead
@@ -36,27 +39,27 @@ outgoing connections be anonymized, but more is possible.
36
39
37
40
In a typical situation, this suffices to run behind a Tor proxy:
38
41
39
-
./bitcoin -proxy=127.0.0.1:9050
42
+
./darkcoind -proxy=127.0.0.1:9050
40
43
41
44
42
-
2. Run a bitcoin hidden server
43
-
------------------------------
45
+
2. Run a darkcoin hidden server
46
+
-------------------------------
44
47
45
48
If you configure your Tor system accordingly, it is possible to make your node also
46
49
reachable from the Tor network. Add these lines to your /etc/tor/torrc (or equivalent
47
50
config file):
48
51
49
-
HiddenServiceDir /var/lib/tor/bitcoin-service/
52
+
HiddenServiceDir /var/lib/tor/darkcoin-service/
50
53
HiddenServicePort 9999 127.0.0.1:9999
51
54
HiddenServicePort 19999 127.0.0.1:19999
52
55
53
56
The directory can be different of course, but (both) port numbers should be equal to
54
-
your bitcoind's P2P listen port (9999 by default).
57
+
your darkcoind's P2P listen port (9999 by default).
55
58
56
-
-externalip=X You can tell bitcoin about its publicly reachable address using
59
+
-externalip=X You can tell darkcoin about its publicly reachable address using
57
60
this option, and this can be a .onion address. Given the above
58
61
configuration, you can find your onion address in
59
-
/var/lib/tor/bitcoin-service/hostname. Onion addresses are given
62
+
/var/lib/tor/darkcoin-service/hostname. Onion addresses are given
60
63
preference for your node to advertize itself with, for connections
61
64
coming from unroutable addresses (such as 127.0.0.1, where the
62
65
Tor proxy typically runs).
@@ -73,18 +76,18 @@ your bitcoind's P2P listen port (9999 by default).
73
76
74
77
In a typical situation, where you're only reachable via Tor, this should suffice:
0 commit comments