Anyone know how to trade/exchange the DAI/XLM/etc into BTC using Coinbase/Coinbase Pro? I used their website a few weeks ago to do exactly this but now I just cannot find where on the site to do this. Maybe I'm just being a blind idiot...
Coinbase does this with multiple cryptos, I think DAI is the 6th or so. The videos are always really well done and they pay out anywhere from $3-50 depending on the crypto. Always nice to learn and earn!
Well I don't pay for or have a shady free VPN but I do have Brave and the built in Tor browser is basically a VPN 🤔
My coinbase account is registered in the US, you dont think coinbase would flag my account or something do you?
Huh... do you know what Tor is haha?
Tor is not a VPN itself but can act as one - Privacy VS Anonimity
What is a VPN?
A Virtual Private Network, or VPN, is a technology that protects your privacy when you use the Internet by routing your connection through a server that hides your IP address and encrypts your online communication.
How do VPNs Work?
A VPN consists of a network of servers, typically located in multiple countries around the world. When you use a VPN, information sent from your computer passes through one of the VPN provider’s servers before going to its online destination, such as your online banking account. Similarly, information sent to your computer from outside your network passes through the VPN server before reaching your device.
As a result, you’re able to send and receive data without giving up your online location. The online destination will only see traffic coming from the VPN server, not your device or true location. Additionally, messages sent from the server are encrypted, blocking unwanted access from third parties.
What is Tor?
At first glance, the Tor network is similar to a VPN. Messages to and from your computer pass through the Tor network rather than connecting directly to resources on the Internet. But where VPNs provide privacy, Tor provides anonymity.
A VPN service can keep outsiders from seeing where you go and what you do on the Internet, but there are ways to defeat the privacy they give you. By its nature, a VPN service has access to information about you. You have to trust them to protect that information.
When you use the Tor network you don’t have to trust anyone. The design of Tor makes you virtually anonymous when you go online. While no system is 100 percent foolproof, it would be exceedingly difficult for anyone to identify you when you use the Tor network.
Is Tor a VPN?
Since both Tor and VPNs perform similar functions, you might wonder, “Is Tor really just a specific type of VPN?” The answer is, “No.” Here’s why:
A VPN is a network of servers that protects your privacy by encrypting your messages and hiding your IP address. Your VPN provider controls both the VPN software on your computer, and the servers in their network. You have to trust your VPN service to protect your privacy when you use their network.
Tor is a network of servers that you communicate with anonymously. No one organization controls both the Tor software on your computer and the individual servers in the network. You don’t need to trust anyone to use Tor safely. As much as anything else, the fact that you don’t need to trust anyone when you use Tor is what makes it distinct from a VPN.
How Does Tor Work?
The Tor network is designed so that no server can know both who you are and what you do. The network consists of thousands of independent servers run by volunteers around the world. Here’s what happens when your computer wants to send a message using the Tor network:
Software on your computer (either the Tor browser or another Tor-enabled program) selects three Tor servers at random. The software then builds a pathbetween those three servers.
The process starts with the server that will connect to the public Internet (called the Exit Node). The Tor software on your computer encrypts the message in a way that only the Exit Node can decrypt.
The software then repeats this processwith the server in the middle. Now the message is encrypted twice.
The software does the same with the server that will first receive the messagefrom your computer (called the Guard Node). Now the message is encrypted three times.
Once the message is encrypted, the Tor software on your computer sends the encrypted message to the Guard Node. This server removes the outermost layer of encryption. The Guard Node cannot read the original message because there are still two layers of encryption. However, the software includes the address of the next server in the path when it encrypts the message.
The Guard Node sends the message to the server in the middle of the path. This server removes the second layer of encryption. Like the first computer it still can’t read the message because there is one more layer of encryption. But removing this layer of encryption tells it the address of the Exit Node.
The middle server sends the message to the Exit Node. The Exit Node removes the final layer of encryption. This means the Exit Node can see your original message. However, because the message was relayed through the other servers in the path, the Exit Node doesn’t know who sent the message.
This is key to understanding Tor so let’s look at what each server in the path knows.
The Guard Node can see the IP address of your computer. But it doesn’t know what the message says because of the additional layers of encryption. So all the Guard Node knows is that your computer sent a message using Tor and that it needs to forward that message to the middle server.
The middle server knows the message came from the Guard Node and that it has to forward the message to the Exit Node. It can’t read the message because there is one layer of encryption left. The middle server doesn’t know who sent the message to the Guard Node because that information isn’t passed through the Tor network.
The Exit Node knows what the message says because it has to peel off the final layer of encryption before the message can go out to the public Internet. But it doesn’t know where the message came from originally. All it knows is that the middle server forwarded the message.
No one server knows or can know both where the message came from and what it says. This is how Tor provides anonymity.
Ohhh I know what you're saying, sorry for the long comment before I literally just copied and pasted from somewhere didnt realize it was gonna be so long 🤣
That is why I am wary about using Tor for that kind of stuff, I also don't know of any trustworthy VPN's that don't cost a ton lol