Monero's on-chain privacy is excellent: ring signatures hide the sender, stealth addresses hide the receiver, and RingCT hides the amount. But there's one gap: your IP address.
Without Tor: When your wallet connects to a Monero node, the node operator sees your IP address. If they correlate that with transaction timing, they can link your real-world identity to your Monero activity. Your ISP can also see that you're connecting to Monero nodes.
With Tor: The node sees a Tor exit node IP — not yours. Your ISP sees encrypted Tor traffic — not Monero connections. Neither can link your identity to your transactions.
Tor is the network layer of privacy. Without it, the on-chain privacy provided by ring signatures, stealth addresses, and RingCT is incomplete — your IP address is the link between your real identity and your Monero usage.
Feather has built-in Tor — the simplest way to use Monero over Tor on desktop.
That's it. No external Tor installation needed. Feather bundles its own Tor binary and manages the connection lifecycle. Status bar shows "Tor" when connected.
Monerujo supports Tor and I2P natively — no separate apps needed.
.onion node address, or let Monerujo find oneMonerujo is the best choice for privacy-focused Android users. I2P support is a bonus — I2P has lower latency than Tor for Monero peer connections.
Cake Wallet doesn't bundle Tor, but works with Orbot (Tor proxy app).
.onion nodeWorks on both Android and iOS. Requires Orbot to be running before opening Cake.
The official GUI requires manual SOCKS5 proxy configuration.
brew install tor (macOS), sudo apt install tor (Linux), or download Tor Browser (Windows)tor (runs SOCKS5 on 127.0.0.1:9050)127.0.0.1:9050.onion node address or use clearnet with the proxyFor maximum privacy, run your own Monero node and expose it as a Tor hidden service.
With this setup, your node communicates with the network exclusively through Tor. Your home IP is never exposed to any peer. pad-transactions=1 pads TX data to a uniform size, preventing traffic analysis.
| Feature | Tor | VPN | I2P |
|---|---|---|---|
| Trust model | Trustless (no single relay sees all) | Trust VPN provider | Trustless (distributed) |
| IP privacy | Excellent | Good (provider can log) | Excellent |
| Speed | Slow (3 relays) | Fast | Medium |
| Wallet sync time | 30-60 min | 5-10 min | 15-30 min |
| Monero integration | Native (since 2020) | External app | Native (since 2020) |
| ISP visibility | Sees Tor traffic (but not content) | Sees VPN traffic | Sees I2P traffic |
| Legal scrutiny | High in some countries | Low | Low (less known) |
| Cost | Free | $3-10/month | Free |
| Best for | Maximum privacy | Speed + basic privacy | Node-to-node privacy |
Recommendation: Use Tor for wallet-to-node connections (hiding your IP from the node). If you run your own node, add I2P for node-to-node connections (hiding your node's IP from peers). VPN is acceptable for casual use but provides weaker guarantees — the VPN company can be compelled to reveal your real IP.
Tor is not a silver bullet. Be aware of these limitations:
pad-transactions=1 in monerod..onion addresses (no DNS needed)..onion nodes (end-to-end encrypted, no exit node involved).Using .onion addresses for remote nodes is better than clearnet + Tor proxy because:
Find current .onion nodes at monero.fail — filter by "Tor" or "I2P" and look for nodes with high uptime. Paste the .onion:18089 address into your wallet's remote node settings.
Do NOT use random .onion nodes blindly. A malicious node can't steal your funds (Monero's cryptography prevents that), but they can:
Best defense: run your own node. Second best: use nodes from trusted community lists like monero.fail.
For the most private Monero setup possible in 2026:
tx-proxy + anonymous-inbound)pad-transactions=1 in monerod)For P2P XMR trading, Tor is especially important. When you trade on Haveno, XMRBazaar, or directly via Telegram, your counterparty might try to correlate your wallet activity with your trading identity. Tor prevents this by hiding your IP from the Monero nodes you connect to.
My setup (arnoldnakamura): Feather Wallet with Tor enabled, connected to my own Monero node running as a Tor hidden service. Every trade counterparty gets a fresh subaddress. 683 trades, zero privacy incidents.
Contact me on Telegram @arnoldnakamura for XMR/EUR P2P trades — Cash by Mail EU-wide, Face-to-Face in SW Germany.