Users will be able to send bitcoins without revealing their computer address or personal data. The function is built into the wallet; customers will only have to activate it to take advantage of it.
Trezor Suite, the new desktop application from wallet firm Trezor, promises its users a greater privacy experience when transferring bitcoins and other cryptocurrencies.
The company is offering this new privacy feature by adding Tor, one of the best-known private browsing networks on the Internet, to its services. In this way, Trezor users will now be able to carry out any operation with their cryptocurrencies without leaving traces of their IP addresses or personal data on the Web.
Tor services are available to users by a single click since the network is incorporated into the operation of the wallet itself. In this sense, it is only necessary for the person to activate the Tor button in the upper right part of the application, so that he begins to carry out transactions with greater privacy.
To understand how private Tor can be, one must take into account that it is a network made up of thousands of servers in management by volunteers and not by a centralized service. Likewise, Tor has a protocol capable of encrypting all the data its users share at different levels, so they can send that information without the need for a third party to know the identification number of the computer where said data originated.
After starting the year with one of the largest security controversies in the hardware wallet market, Trezor decided to start getting more and more on the security and privacy of its products. Last October, it announced the launch of its Trezor Suite application which will be in a trial version to the public until 2021, and they assure that it is a safer option to manage funds in crypto assets.
How does Tor work?
Tor prevents third parties from knowing the IP address of a user by distributing operations between different places on the Internet through random routing and message encryption; attackers take advantage of this anonymity to generate spam on the web without any trace. The Foundation says it is challenging to filter “good customers from bad” due to the private nature of the network, which limits the ability of operators to react to these attacks.
Although the service improved its circuit management and protected its host from CPU exhaustion, the problem is still present. Due to this, the organization considers that it is necessary to make “fundamental changes” in the constitution of Tor, highlighting among them the use of anonymous tokens as a reward or the imposition of a Proof of Work consensus algorithm that increases the costs of an attack Denial of Service.
By: Jenson Nuñez.