Monero + Tor — How to Use XMR Over Tor for Maximum Privacy

TL;DR: Monero hides what you transact (amounts, addresses) but not where you transact from (your IP). Routing Monero through Tor hides your IP from node operators, ISPs, and network observers. Feather Wallet has one-click Tor. For mobile, use Monerujo (Tor/I2P built-in) or Cake + Orbot.

Why Tor Matters for Monero

Monero's on-chain privacy is excellent: ring signatures hide the sender, stealth addresses hide the receiver, and RingCT hides the amount. But there's one gap: your IP address.

Without Tor: When your wallet connects to a Monero node, the node operator sees your IP address. If they correlate that with transaction timing, they can link your real-world identity to your Monero activity. Your ISP can also see that you're connecting to Monero nodes.

With Tor: The node sees a Tor exit node IP — not yours. Your ISP sees encrypted Tor traffic — not Monero connections. Neither can link your identity to your transactions.

The Privacy Stack

Ring Signatures
Hides sender (on-chain)
Stealth Addresses
Hides receiver (on-chain)
RingCT
Hides amount (on-chain)
Dandelion++
Hides TX origin node
Subaddresses
Unlinkable addresses
Coin Control
Output management
Tor / I2P
Hides YOUR IP address
VPN
Hides from ISP (less private)
Own Node
Eliminates 3rd-party trust

Tor is the network layer of privacy. Without it, the on-chain privacy provided by ring signatures, stealth addresses, and RingCT is incomplete — your IP address is the link between your real identity and your Monero usage.

Wallet Setup Guides

Feather Wallet (Desktop) Easy

Feather has built-in Tor — the simplest way to use Monero over Tor on desktop.

  1. Download from featherwallet.org
  2. Open Settings → Network → Proxy
  3. Select "Tor (bundled)" — Feather runs its own Tor instance
  4. All wallet traffic now routes through Tor automatically

That's it. No external Tor installation needed. Feather bundles its own Tor binary and manages the connection lifecycle. Status bar shows "Tor" when connected.

# Verify Tor is active: # Look for the onion icon in Feather's status bar # Or check Settings > Network — should show "Connected via Tor"

Monerujo (Android) Easy

Monerujo supports Tor and I2P natively — no separate apps needed.

  1. Install from F-Droid or Play Store
  2. Settings → Network → Enable Tor (or I2P)
  3. Add a .onion node address, or let Monerujo find one
  4. All traffic routes through the selected overlay network

Monerujo is the best choice for privacy-focused Android users. I2P support is a bonus — I2P has lower latency than Tor for Monero peer connections.

Cake Wallet + Orbot (Mobile) Medium

Cake Wallet doesn't bundle Tor, but works with Orbot (Tor proxy app).

  1. Install Orbot from F-Droid or Play Store
  2. Open Orbot → Enable VPN mode → Select "Cake Wallet" in app list
  3. Connect to Tor in Orbot
  4. Open Cake Wallet → Settings → Connection → Use a .onion node

Works on both Android and iOS. Requires Orbot to be running before opening Cake.

Monero GUI (Desktop) Medium

The official GUI requires manual SOCKS5 proxy configuration.

  1. Install Tor: brew install tor (macOS), sudo apt install tor (Linux), or download Tor Browser (Windows)
  2. Start Tor service: tor (runs SOCKS5 on 127.0.0.1:9050)
  3. Monero GUI → Settings → Node → Remote node
  4. Set SOCKS5 proxy: 127.0.0.1:9050
  5. Enter a .onion node address or use clearnet with the proxy
# Start Tor daemon (runs in background): tor & # Common .onion nodes (verify these are current): # xmrnode3iyizc4a3.onion:18089 # Check monero.fail for updated .onion nodes

Running Your Own Node Over Tor Advanced

For maximum privacy, run your own Monero node and expose it as a Tor hidden service.

# /etc/tor/torrc — add hidden service: HiddenServiceDir /var/lib/tor/monero/ HiddenServicePort 18089 127.0.0.1:18089 # monerod config (bitmonero.conf): anonymous-inbound=YOUR_ONION.onion:18089,127.0.0.1:18089 tx-proxy=tor,127.0.0.1:9050,16 pad-transactions=1 # Restart both: sudo systemctl restart tor ./monerod --config-file bitmonero.conf

With this setup, your node communicates with the network exclusively through Tor. Your home IP is never exposed to any peer. pad-transactions=1 pads TX data to a uniform size, preventing traffic analysis.

Tor vs VPN vs I2P for Monero

Feature Tor VPN I2P
Trust modelTrustless (no single relay sees all)Trust VPN providerTrustless (distributed)
IP privacyExcellentGood (provider can log)Excellent
SpeedSlow (3 relays)FastMedium
Wallet sync time30-60 min5-10 min15-30 min
Monero integrationNative (since 2020)External appNative (since 2020)
ISP visibilitySees Tor traffic (but not content)Sees VPN trafficSees I2P traffic
Legal scrutinyHigh in some countriesLowLow (less known)
CostFree$3-10/monthFree
Best forMaximum privacySpeed + basic privacyNode-to-node privacy

Recommendation: Use Tor for wallet-to-node connections (hiding your IP from the node). If you run your own node, add I2P for node-to-node connections (hiding your node's IP from peers). VPN is acceptable for casual use but provides weaker guarantees — the VPN company can be compelled to reveal your real IP.

Security Considerations

Tor is not a silver bullet. Be aware of these limitations:

Monero .onion Nodes

Using .onion addresses for remote nodes is better than clearnet + Tor proxy because:

Find current .onion nodes at monero.fail — filter by "Tor" or "I2P" and look for nodes with high uptime. Paste the .onion:18089 address into your wallet's remote node settings.

Do NOT use random .onion nodes blindly. A malicious node can't steal your funds (Monero's cryptography prevents that), but they can:

Best defense: run your own node. Second best: use nodes from trusted community lists like monero.fail.

Maximum Privacy Checklist

For the most private Monero setup possible in 2026:

  1. Run your own node on a dedicated machine or VPS (no third-party trust)
  2. Route monerod through Tor/I2P (tx-proxy + anonymous-inbound)
  3. Use Feather Wallet with built-in Tor, connecting to your own node
  4. Enable coin control in Feather (manage which outputs you spend)
  5. Use a fresh subaddress for every transaction
  6. Use view-only wallet for monitoring (keep spend key offline)
  7. Pad transactions (pad-transactions=1 in monerod)
  8. Wait for FCMP++ — eliminates ring size limitations entirely

P2P Trading Over Tor

For P2P XMR trading, Tor is especially important. When you trade on Haveno, XMRBazaar, or directly via Telegram, your counterparty might try to correlate your wallet activity with your trading identity. Tor prevents this by hiding your IP from the Monero nodes you connect to.

My setup (arnoldnakamura): Feather Wallet with Tor enabled, connected to my own Monero node running as a Tor hidden service. Every trade counterparty gets a fresh subaddress. 683 trades, zero privacy incidents.

Contact me on Telegram @arnoldnakamura for XMR/EUR P2P trades — Cash by Mail EU-wide, Face-to-Face in SW Germany.