#amethyst <> #tor <> #bostr2 <> #tor <> #relay
#privacy
Login to reply
Replies (6)
Are you using torsocks to run bostr2?
I figured if the bouncer is not torified the outgoing websocket connections are leaking the public IP of the server to the connected relays. (The client is safe.)
My systemd service here in a #Raspiblitz PR: 
GitHub
add bostr2 install script (nostr bouncer / multiplexer relay in Go) by openoms · Pull Request #4724 · raspiblitz/raspiblitz
This is to replace the use of the LNbits nostrclient extension as it is much more efficient.
I discovered tor-router recently and installed it in the #ProxMox #LXC that runs #bostr.

GitHub
GitHub - Edu4rdSHL/tor-router: A tool that allows you to make TOR your default gateway and send all internet connections under TOR (as transparent proxy) to increase privacy/anonymity without extra unnecessary code.
A tool that allows you to make TOR your default gateway and send all internet connections under TOR (as transparent proxy) to increase privacy/anon...
Great find, I also had it starred already! Can be suitable for a private server.
My home nodes are mostly in hybrid mode using a VPN (Tailscale / Tunnelsats) to some VPS to create clearnet endpoints.
Also there are some basic things (like apt updates) I prefer doing over the clear for the speed.
I setup tor-router on my apt-cacher-ng #LXC too. LOL 😂
#amethyst <> #tor <> #bostr2 <> #tor <> #relay
#privacy
View quoted note →
Updated to just use WoT relays.
#amethyst <> #tor <> #bostr2 <> #tor <> only #wotrelay
#privacy #spam