DDOS attacks on the TOR network result in an I2P solution for Bitcoin privacy apps.

DDOS attacks have plagued Bitcoin privacy apps and lightning nodes for the majority of this year, as TOR, the network used by many of these applications, has been under attack. In response, the MercuryWallet team decided to make their wallet compatible with both TOR and I2P, a decentralized network that allows for anonymous internet communication.

TOR, or The Onion Router, is an encrypted internet overlay made up of thousands of relays that ensure network traffic is untraceable. IP addresses on the TOR network, like those on a VPN, are untraceable.

However, because a VPN is traditionally based on a centralized provider, the centralized entity may be forced to release the IP addresses of those on the network.

When using TOR, encryption is provided by a decentralized group of volunteer nodes, making it much more difficult for anyone to track down the source IP address of a connection. Furthermore, Bitcoin privacy apps use the TOR network to conceal network activity in order to improve privacy when interacting with the Bitcoin blockchain.

Throughout 2022, the TOR network has been subjected to continuous DDOS attacks, causing it to operate at far below satisfactory speeds. Distributed Denial of Service (DDOS) attacks are persistent attacks on a network launched by a decentralized cluster of computers pinging the network at or near its capacity. Due to artificially created congestion, the network slows down as a result of the traffic volume.

DDOS attacks have been a persistent problem for the TOR network for years.

The deterioration in TOR network performance caused by said DDOS attacks had an impact on applications that use the TOR network, including Bitcoin wallets like Mercury Wallet.

Because MercuryWallet is application protocol agnostic, users can switch to I2P if TOR fails or becomes unavailable. This allows them to continue using the wallet and accessing their funds even if TOR is under attack.

The Invisible Internet Project (I2P) is a robust and resilient network that uses encryption and tunneling to protect its users’ privacy and anonymity. It is built to withstand attacks and censorship, and it has proven to be a trustworthy alternative to TOR for anonymous communication.

MercuryWallet’s success demonstrates the importance of applications being protocol agnostic and adapting to changing network conditions.

As distributed denial-of-service (DDOS) attacks and other forms of online disruption become more common, applications must consider alternative networks and protocols to maintain functionality and security.

So far, MercuryWallet’s results have been positive, with users reporting smooth and reliable performance when using both TOR and I2P. Furthermore, by embracing protocol agnosticism, MercuryWallet has demonstrated its commitment to delivering a high-quality and secure user experience even in difficult circumstances.

Add a Comment

Your email address will not be published. Required fields are marked *