• 2 Posts
  • 7 Comments
Joined 1 month ago
cake
Cake day: August 5th, 2024

help-circle
  • Even assuming an observer somehow knows the serial number of a spent bill, there is no central database tracking cash transactions. There is no history attached to cash, and no further trail for the observer to follow. While it is unlikely that an observer knows which specific bill you owned, it is downright impossible for the observer to know how you came into possession of said bill, or how it will be spent in the future.

    I’d push back on this. Many people get cash from a bank ATM. Businesses often deposit the cash they receive back into a bank. Truthfully I think there are very few hops between the cash withdrawal and deposit, and banks can easily check serial numbers and associate them with you. So an observer like the government/financial authority can probably piece together in most cases how you came into possession of a bill based on ATM withdrawal and where you spent it, based on deposit.

    I think this same method is why Bitcoin’s privacy is lacking. Satoshi said in the Bitcoin paper that privacy can be maintained by ensuring our addresses remain pseudonymous. In reality, that’s just too difficult to do and too much information is leaked because addresses can be tracked and traced and labelled especially when going to and from exchanges when people want to pay for things that do not accept cryptocurrency. So, although I don’t think Bitcoin’s privacy is better than cash, mostly to the point that serial numbers are not recorded on non-bank cash transfers, I think it’s wrong to say cash is “downright impossible” to track.








  • It’s easy. Just edit your Tor configuration file (torrc) to enable an onion service. This one forwards from the onion service on port 80 (so users don’t have to specify a port number in the URL) to a local HTTP server running on your machine on port 8000:

    HiddenServiceDir /var/lib/tor/hidden_service/
    HiddenServicePort 80 127.0.0.1:8000
    

    Change the directory path based on your operating system. Specify a directory that doesn’t exist yet so Tor can set the correct permissions on it. Next, start or restart Tor. Then just read the onion service’s hostname in the hostname file created in that hidden services directory.

    You can then run any HTTP server on localhost:8000 and anyone connecting to your onion service can access it. In Python this might be as simple as python3 -m http.server --bind localhost 8000 --directory . to share the files current directory (but be aware that there are some security considerations, like symbolic links, to be aware of. Just use this for testing.) For production servers you will want a “real” http server.