TOR Safety and MWC

Chris Dev

//
August 17, 2020

A recent article was released which discusses a TOR exploit that affects Bitcoin. The attack necessitated that the attackers control a high percentage of TOR exit nodes. We wanted to make it clear that the MWC TOR payments are not affected by this attack. That's because MWC uses V3 onion addresses which are end-to-end encrypted. So, the exit nodes cannot see what data is being transferred and thus cannot modify or view any payment data.

Also, we wanted to include a screenshot of a mainnet node that has tor inbound and outbound connections.

Tor inbound/outbound connections

As can be seen, now a computer that is completely behind a firewall, can have inbound TOR connections. In the image above there are 9 outbound IP based connections. These connections use a TOR proxy, there are 2 TOR outbound onion address connections, and 3 TOR inbound connections. The network is quickly moving behind TOR. It will likely remain a hybrid network because mining is more effectively done with public IPs due to latency, but even mining can be done behind TOR if need be. The MWC network is truly becoming a "ghost network" as the location of its participants is becoming unknown. One of our mining pools "PacificPool", has created a TOR vanity address for their MWC node. As seen in the picture it's the one that starts with "pacific". It's great to see MWC users getting into the spirit of things like that.


"It takes a great deal of bravery to stand up to our enemies, but just as much to stand up to our friends."

— Albus Dumbledore, Harry Potter and the Sorcerer's Stone

(J.K. Rowling)