Why Tor on a privacy chain
Stealth addresses, ring mixing, and the two-pool model all defend against on-chain analysis. They don't help if your node's IP is logged by every peer when you broadcast a TX. Tor closes that gap by tunneling all P2P traffic through the Tor anonymity network.
Layered defense
- Tor — hides your IP from peers
- Dandelion++ — hides which node first broadcast among peers
- Stealth + ring — hides who got paid and how much
Step-by-step
-
Install Tor
# Debian / Ubuntu / Raspberry Pi OS $ sudo apt update && sudo apt install tor # macOS $ brew install tor # Windows: download Tor Expert Bundle from torproject.org -
Make sure Tor is running on port 9050
$ sudo systemctl enable --now tor $ ss -lnt | grep 9050 LISTEN 0 4096 127.0.0.1:9050 0.0.0.0:* -
Edit your MaryJaneCoin.conf
Path:
~/.MaryJaneCoin/MaryJaneCoin.confon Linux/macOS or%APPDATA%\MaryJaneCoin\MaryJaneCoin.confon Windows.# Route all P2P traffic through Tor proxy=127.0.0.1:9050 onlynet=ipv4 listen=0 discover=0 # Optional: only connect to onion seeds # onlynet=onion -
Restart the daemon
$ MaryJaneCoind stop $ MaryJaneCoind -daemon -
Verify Tor is in use
$ MaryJaneCoind getnetworkinfo | grep -A2 networks # look for: "name": "ipv4", "proxy": "127.0.0.1:9050" $ MaryJaneCoind getpeerinfo | head -30 # external addresses should be onion or your VPN exit -
Confirm DNS is also tunneled
$ MaryJaneCoind getnetworkinfo | grep -i nameproxy # nameproxy should equal proxy — DNS leaks defeat the whole point
Seed nodes vs staking nodes
The seed nodes (
seeds.maryjanecoin.net) stay non-Tor on purpose so new wallets can find peers. All nodes that hold funds — yours — should be behind Tor.
Don't reuse the daemon's wallet over the regular internet
Once you've configured Tor, never start the daemon without it — that one accidental boot leaks your IP to every peer that connects in the first 60 seconds.