WHY PRIVACY MATTERS
In the digital era, safeguarding your privacy has become increasingly vital. While some may view privacy as a lost cause, it is not. Your privacy is at stake and should be a concern. Privacy holds significant value as it relates to power, and ensuring that power is wielded responsibly is crucial.
Tor & I2P Technologies
Tor is a proxy tool that ustilizes the Tor network to establish connections for applications. Torbot achieves this by routing their traffic through Tor, thus enhancing privacy and anonymity for these applications.
The I2P network, also known as the Invisible Internet Project, is a fully encrypted peer-to-peer overlay network. It ensures that the contents, source, and destination of messages are hidden from observers. In other words, nobody can see the origin or destination of the traffic or the actual contents of the messages being transmitted. The encryption used in I2P ensures a high level of privacy and anonymity for its users.
Tor and I2P share common features but also have significant differences.
Both Tor and I2P are decentralized and anonymous peer-to-peer networks, but I2P provides higher levels of security compared to Tor. However, I2P is primarily designed for accessing services like email, chat, and torrenting within its network and cannot be used to access the regular internet. On the other hand, Tor allows users to access the deep web, just like I2P, but it also functions as a regular browser for accessing websites on the surface web.
Note: For more information on similarities and differences of Tor & I2P visit here
Intergrating Tor with Ywallet on Smartphone
Orbot is a no-cost virtual private network (VPN) designed for smartphones that directs traffic from all applications on your device through the Tor network.
Follow these instructions below to Connect Tor to Zcash Wallet (Ywallet):
- Download and install Orbot from the app store.
- After installation, a greetings message will appear. Continue to the Orbot home page and click on ‘Tor Enabled Apps’.
- This will prompt a page on the screen showing the Tor-compatible applications. Look For the Ywallet App and make sure it is selected.
- A connection request to set up a VPN will appear, which will allow Orbot to monitor the network traffic. Orbot will Initialize once this permission has been approved.
- Check the taskbar or the Orbot homepage to verify that Tor is running, this is confirmed when you see ‘Connected to the Tor network’.
- For video tutorial watch here
Note: If Tor is blocked by your mobile network, you may use a Bridge Server as an alternative way to connect.
How to set up a Zcash wallet with Tor on PC/Desktop
Tor support in Zcash?
- Tor browser can be downloaded from the official website, you can access the link here.
The most convenient way for installing Tor is through the Tor Browser Bundle. If you prefer headless installations, you may opt to install the Tor daemon separately.
Note: By default, Tor Browser bundle exposes a SOCKS listener on tcp/9150 and Tor daemon exposes the SOCKS listener on tcp/9050.
- Refer to the installation instructions specific to your operating system as provided by the Tor Project.
Zcashd is the official linux-based full-node wallet which is updated and maintained by core developers from the Electric coin Co. It is intended for users who may want to mine and validate zcash transactions, as well as sending and receiving Zcash.
- The official website to download Zcashd Wallet can be found here
- Install wallet: Link to the Tutorial video here provided by the Zcash wallet developers.
Run Zcashd over Tor
- In order to Configure Zcashd to use Tor SOCKS proxy, you can append the -proxy command line argument to the daemon command.
$ zcashd -proxy=127.0.0.1:9050
Alternatively, add the following line to the zcash.conf file:
For configuration changes to take effect, it is advised to restart zcashd.
Note that this assumes that the Tor daemon is being used. In case the Tor Browser Bundle is being used, replace 9050 with 9150.
Additionally, you can append the command line argument -listenonion to make the daemon generate an .onion address at which your node can be reached.