About this Episode

This is a quick reminder to pay attention to the information you give block explorers. Connecting to them over Tor may not be enough for some threat models. They may not be malicious, but you are giving them the opportunity to collect information about you. Run your own full node instead, and consider running your own block explorer.