diff --git a/doc/i2p.md b/doc/i2p.md index b769a74df46..624b651f62a 100644 --- a/doc/i2p.md +++ b/doc/i2p.md @@ -166,3 +166,13 @@ In most cases, the default router settings should work fine. Please see the "General Guidance for Developers" section in https://geti2p.net/en/docs/api/samv3 if you are developing a downstream application that may be bundling I2P with Bitcoin. + +## Privacy recommendations + +- Operating a node that listens on multiple networks (e.g. IPv4 and I2P) can help + strengthen the Bitcoin network, as nodes in this configuration (i.e. bridge nodes) increase + the cost and complexity of launching eclipse and partition attacks. However, under certain + conditions, an adversary that can connect to your node on multiple networks may be + able to correlate those identities by observing shared runtime characteristics. It + is not recommended to expose your node over multiple networks if you require + unlinkability across those identities. diff --git a/doc/tor.md b/doc/tor.md index 839c02eea9f..e9db555fc98 100644 --- a/doc/tor.md +++ b/doc/tor.md @@ -238,3 +238,10 @@ for normal IPv4/IPv6 communication, use: Otherwise it is trivial to link them, which may reduce privacy. Onion services created automatically (as in section 2) always have only one port open. +- Operating a node that listens on multiple networks (e.g. IPv4 and Tor) can help + strengthen the Bitcoin network, as nodes in this configuration (i.e. bridge nodes) increase + the cost and complexity of launching eclipse and partition attacks. However, under certain + conditions, an adversary that can connect to your node on multiple networks may be + able to correlate those identities by observing shared runtime characteristics. It + is not recommended to expose your node over multiple networks if you require + unlinkability across those identities.