Compare commits

...

2 Commits

Author SHA1 Message Date
Eval Exec
a0e1d9272b
Merge 65e503e8499f18e48d7801a298d9acdd6ed62d0b into cd8089c20baaaee329cbf7951195953a9f86d7cf 2025-03-16 17:14:59 +01:00
Eval EXEC
65e503e849
torcontrol: Add comment explaining Proxy credential randomization for Tor privacy
Signed-off-by: Eval EXEC <execvy@gmail.com>
2025-03-04 00:03:41 +08:00

View File

@ -397,7 +397,11 @@ void TorController::get_socks_cb(TorControlConnection& _conn, const TorControlRe
Assume(resolved.IsValid());
LogDebug(BCLog::TOR, "Configuring onion proxy for %s\n", resolved.ToStringAddrPort());
Proxy addrOnion = Proxy(resolved, true);
// With m_randomize_credentials = true, generates unique SOCKS credentials per proxy connection (e.g., Tor).
// Prevents connection correlation and enhances privacy by forcing different Tor circuits.
// Requires Tor's IsolateSOCKSAuth (default enabled) for effective isolation (see IsolateSOCKSAuth section in https://2019.www.torproject.org/docs/tor-manual.html.en).
Proxy addrOnion = Proxy(resolved, /*_randomize_credentials*/ true);
SetProxy(NET_ONION, addrOnion);
const auto onlynets = gArgs.GetArgs("-onlynet");