Loading...

$BATA via TOR | i2P

Privacy Features

BTA Optional Privacy Gateways

Anonymous commercial transactions can protect the privacy of consumers. Some consumers prefer to use cash when buying everyday goods (like groceries or tools), to prevent sellers from aggregating information or soliciting them in the future. Credit cards are linked to a person’s name, and can be used to discover other information, such as postal address, phone number, etc. Bata is the “cash” of the information super highway.

When you choose to use your BTA Wallet with TOR or i2P Bata Nodes, your IP address is hidden, no need for external mixers or other 3rd Party methods. Bata’s Wallet has integration with I2P or TOR – a hidden wallet address provides privacy and extra security from hackers or anyone else. Bata adds another dimension to the way you spend money by giving you the freedom and privacy of Peer to Peer transactions. Your money is your business, not ours, or anyone elses.

With Bitcoin, transactions are published to the Block Chain and you can prove who made them or to whom, but with Bata the anonymization your IP address via i2P or TOR makes it impossible to trace them. This is important because the block chain is accessible to anyone with an internet connection – a significant drawback for those who don’t wish their transaction history and balances to be publicly available. Bata does this through utilizing an innovative decentralized network of servers called BTA i2P and TOR Nodes, avoiding the need for a trusted third party that could compromise the integrity of the system.

WHAT IS TOR?

TOR is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities, relationships and state security.

WHAT IS I2P?

The Invisible Internet Project (I2P)

I2P is an anonymous network, exposing a simple layer that applications can use to anonymously and securely send messages to each other. The network itself is strictly message based (a la IP), but there is a library available to allow reliable streaming communication on top of it (a la TCP).

All communication is end to end encrypted (in total there are four layers of encryption used when sending a message), and even the end points (“destinations”) are cryptographic identifiers (essentially a pair of public keys).

Most commentary on the Internet is essentially done anonymously, using unidentifiable pseudonyms. While these usernames can take on an identity of their own, they are frequently separated and anonymous from the actual author. According to the University of Stockholm this is creating more freedom of expression, and less accountability. Wikipedia is collaboratively written mostly by authors using either unidentifiable pseudonyms or IP address identifiers, although a few have used identified pseudonyms or their real names.

However, the Internet was not designed for anonymity: IP addresses serve as virtual mailing addresses, which means that any time any resource on the Internet is accessed, it is accessed from a particular IP address. This address can be mapped to a particular Internet Service Provider (ISP), and this ISP can then provide information about what customer that IP address was leased to. This does not necessarily implicate a specific individual (because other people could be using that customer’s connection, especially if the customer is a public resource, such as a library), but it provides regional information and serves as powerful circumstantial evidence.

Anonymizing services such as I2P and Tor address the issue of IP tracking. In short, they work by encrypting packets within multiple layers of encryption. The packet follows a predetermined route through the anonymizing network. Each router sees the immediate previous router as the origin and the immediate next router as the destination. Thus, no router ever knows both the true origin and destination of the packet. This makes these services more secure than centralized anonymizing services (where a central point of knowledge exists, as do in other crypto currencies).

The change has began, we call it Bata.