Curriculum
Course: Crypto Wallets
Login

Curriculum

Crypto Wallets

Video lesson

Remove MetaMask IP Tracking

Escaping Infura: MetaMask Exposed: Protect Your Privacy

A Guide to Expanding Your Crypto Privacy

If you thought that using MetaMask was a surefire way to keep your online activities private, think again! With the revelation that ConsenSys, the parent company behind MetaMask, would start tracking user IP addresses through Infura, many users are left reeling. Imagine being at a party where everyone is recording your every word – that’s what using MetaMask has become. But wait! There’s hope! In this lesson, we’ll detail how to remove this unwelcome tracking and leverage alternative nodes for a more private and decentralized experience.

What can you expect to gain from this lesson? Here are the key takeaways:

  • Learn how to bypass IP tracking by changing your RPC node in MetaMask.
  • Understand the implications of centralized nodes and the importance of privacy in the crypto space.
  • Gain insights into potential alternatives like Poked for added anonymity.

Understanding the Shift from Infura to Alternative RPC Nodes

In this lesson, we delve into a pressing issue brought to light by Crypto Rick regarding MetaMask’s new policy, which allows ConsenSys to collect IP addresses from users via Infura. This development raises significant privacy concerns among crypto enthusiasts, especially those who value decentralization. By relying on a centralized provider like Infura, users risk having their activities tracked, which fundamentally undermines one of the core principles of the blockchain ethos: privacy and anonymity.

The main argument revolves around the necessity for crypto users to take proactive steps to protect their privacy. Specifically, Crypto Rick outlines a straightforward process for switching from Infura to an alternative node, Poked. This approach not only protects user data from tracking but also helps maintain the decentralized spirit of blockchain technology.

One striking claim made in this discussion is the assertion that “JP Morgan own[s] critical Ethereum infrastructure,” revealing how the financial giants continue to intertwine with the blockchain landscape, raising questions about the true independence of decentralized technologies.


Steps to Follow: Transitioning to a Privacy-Respecting RPC Node

If you want to regain your privacy and avoid being tracked while using MetaMask, follow these simple steps outlined by Crypto Rick:

  1. Go to the top of your MetaMask interface and click on the current network, which will usually display “Ethereum Mainnet.”
  2. Select “Add Network” from the dropdown menu to begin adding a new custom RPC network.
  3. Add a name for the new network (for example, “Ethereum New”).
  4. Input the following RPC URL:
    https://eth-ETH-RPC.gateway.poked.network
    
  5. Enter “1” for the Chain ID and “ETH” as the symbol.
  6. Set the Block Explorer URL to:
    https://etherscan.io
    
  7. Confirm and save the new network settings.

Key Point: It’s essential to emphasize that while the new settings will not track your IP address, it’s crucial to ensure that you are not still operating from the old Infura network. Users should remove or at least refrain from using settings that involve Infura.


Deeper Analysis: The Importance of Privacy and Alternative Nodes

The implications of the shift away from Infura extend beyond mere functional changes in using MetaMask. The core message of ensuring privacy within the blockchain context resonates profoundly in an era where data is king. Here are some notable points from Crypto Rick’s discussion that elucidate this need for increased awareness and action.

  1. The Value of Anonymity: The foundational principle of cryptocurrencies is that they offer users the ability to transact privately. The introduction of IP tracking creates a risk that could lead to unwanted surveillance and potential manipulation of personal data. By opting for nodes that do not track IPs, users reclaim their agency.

  2. Centralization vs. Decentralization: Infura represents a centralized form of Ethereum node service, where a single entity has the power to monitor user behavior. In stark contrast, decentralized alternatives like Poked disperse that power among many users, ensuring that no single entity can surveil the community effectively. This notion of decentralization is echoed across the blockchain technology spectrum, reminding users that booting out central powers aids in maintaining industry integrity.

  3. Misinformation from Major Players: As Crypto Rick rightly points out, the connection between companies like ConsenSys, which operates MetaMask, and giant financial institutions like JP Morgan raises eyebrows. It is crucial for the crypto community to question the motives behind these interconnected systems and advocate for practices that promote true decentralization.

  4. Community Input is Vital: The call for community commentary illustrates an essential element of blockchain: user participation. When users collectively engage in dialogue about privacy and security, they become an indomitable force driving the evolution of the sector. This interactive nature not only fosters a better understanding of challenges but also encourages innovation.

While these points present a robust case for making changes in how users interact with MetaMask, there may be limitations worth discussing. Some users might wonder about the reliability and availability of alternative nodes and whether they may inadvertently expose themselves to new risks by being overly reliant on lesser-known services. Nevertheless, the urgency of taking steps to protect one’s privacy is paramount.


Stay Anonymous: How to Bypass MetaMask’s IP Tracking

The discussion on bypassing MetaMask’s tracking resonates deeply within the larger blockchain context. In the face of tightening regulations and increasing scrutiny from governments worldwide, users are gravitating toward decentralized finance (DeFi) solutions that champion privacy above all.

Private nodes like Poked offer a viable alternative for those tired of being monitored while engaging in crypto transactions. The importance of these alternative networks is accentuated in a landscape where mainstream banking giants attempt to assimilate decentralized technologies into their systems for profit, potentially compromising the core tenets of blockchain.

Advantages of Decentralization in DeFi: By using decentralized networks and protocols, individuals can ensure that their financial dealings remain private and less subject to surveillance. Furthermore, DeFi platforms that operate on a model of transparency and user control can offer significant advantages to those seeking autonomy over their assets.

On the flip side, users must remain vigilant, as the proliferation of alternative nodes might lead to new complexities. The lack of established reputations or regulatory oversight can pose risks, which beg the question: To what extent can we trust these decentralized alternatives?


Wider Outlook and Impact: Future Predictions in the Crypto Industry

The implications of transitioning to private nodes extend beyond individual user privacy; they hint at broader societal trends in how we approach technology and finance. The growing demand for anonymity in the wake of tightening control from institutions positions privacy as a core value in the crypto space.

As blockchain technology continues to innovate, we may see a renaissance of decentralized applications that prioritize user sovereignty. It’s possible that as these tools become more mainstream, they will lead to a decline in trust in centralized financial institutions. Users might decide to leverage decentralized platforms even more aggressively, leading to transformative shifts in how we perceive and interact with money.

Emerging technologies like layer-2 scaling solutions and privacy coins will further empower individuals to take control of their digital lives effectively. Looking ahead, we could witness a bifurcation of the financial landscape, where decentralized options grow robust to counteract centralized authority.


Personal Commentary and Insights: A Call for Vigilance in a Shifting Landscape

From my perspective, the urgency with which users must adopt privacy-first practices cannot be understated. Our digital footprints are not merely benign indicators of activity; they represent a comprehensive mapping of our lives, sentiments, and behaviors. As such, protecting our privacy in crypto isn’t just a precaution—it’s a necessity.

In my experience within the crypto community, I’ve seen countless instances where individuals have inadvertently compromised their information through lack of awareness. The age of data manipulation is relentless, and every user must be engaged and proactive about their choices. Thankfully, guides like this one pave the way for a more conscious approach to utilizing platforms like MetaMask.


Conclusion

In this lesson, we unwrapped the critical issue of IP tracking by MetaMask and the practical steps users can take to safeguard their privacy through alternative RPC nodes. By taking ownership over how we interact with blockchain technology, we empower ourselves to uphold its foundational principles of decentralization and privacy.

If there’s one takeaway, it’s this: the power rests within your hands to maintain your anonymity in this rapidly evolving landscape.


Quotes:

  1. “This defeats the point of decentralization.”
  2. “You don’t want those nodes that they’re going to be tracking… you want nodes you know some other person’s Ethereum nodes that they can’t track.”
  3. “Find out whether it’s a good entity or a bad entity and act accordingly.”

 

 

 

Safeguarding Your Privacy: Avoid IP Tracking in MetaMask

In an age where online privacy is increasingly under siege, understanding the implications of your digital interactions is more crucial than ever—especially for cryptocurrency users. Recently, MetaMask, owned by ConsenSys, announced that it would begin collecting user IP addresses while interacting with Ethereum through its Infura nodes. But fear not, there are alternatives! This lesson will cover how to remove the Infura RPC node from MetaMask and replace it with a decentralized option, safeguarding your identity and maintaining the spirit of decentralization fundamental to blockchain technology.

Core Concepts

  1. MetaMask: A popular browser extension and mobile application that allows users to manage their Ethereum-based assets and interact with decentralized applications (dApps). While it enhances accessibility to the Ethereum network, it can also raise privacy concerns due to centralized data collection.

  2. Infura: A blockchain infrastructure service that provides access to Ethereum nodes. Infura simplifies interaction with the Ethereum blockchain but poses a risk to user privacy, as it tracks IP addresses.

  3. RPC (Remote Procedure Call): A protocol used by MetaMask to interact with Ethereum nodes. It enables your local application (like MetaMask) to request data from a remote server (the Ethereum network), impacting how your data is perceived in terms of privacy.

  4. Decentralization: This principle signifies that power and control are distributed rather than centralized. In blockchain, it is fundamental to a user’s privacy and security; centralized entities can compromise these ideals.

  5. Chain ID: A unique identifier for each blockchain that helps distinguish it from others. In Ethereum, the Chain ID is ‘1’. This is vital for ensuring that transactions are processed on the correct network.

  6. Ethereum Mainnet: The main public Ethereum blockchain where real transactions occur. Understanding the distinction between the mainnet and testnets is crucial for users, especially when managing their assets.

  7. Blockchain Explorer: A web service that allows users to view transactions on the blockchain. For Ethereum, Etherscan is the go-to explorer providing transparency regarding addresses and transactions.

Grasping these concepts is essential for newcomers because they lay the groundwork for understanding how blockchain can operate without sacrificing privacy—especially vital in today’s crypto world.

Key Steps

1. Understanding the Issue

  • Key Points:

    • Recent updates from ConsenSys indicate that MetaMask will start collecting IP addresses of users.
    • This undermines the decentralization ethos of blockchain.
  • Detailed Explanation: The announcement from MetaMask has raised eyebrows among crypto enthusiasts about privacy concerns. Since MetaMask serves as a gateway to the Ethereum network, it is vital for users to be aware of how their data might be tracked. Understanding this enables users to make informed decisions about their privacy and security when using blockchain technology.

2. Replace Infura RPC Node

  • Key Points:

    • Steps to bypass Infura’s tracking involve switching to a decentralized RPC node.
    • Recommended alternative: Poked RPC.
  • Detailed Explanation: To enhance your privacy, the first step requires navigating to the network settings in MetaMask. You’ll want to add a custom RPC network to replace Infura with a decentralized alternative. By using a URL like https://eth-rpc.gateway.poked.network, you’re not only regaining privacy but also embracing the decentralized spirit that blockchain is built upon.

3. Manually Add an RPC Network

  • Key Points:

    • Name the new network, input details like RPC URL, chain ID, symbol, and block explorer.
    • It’s straightforward—consistency is key!
  • Detailed Explanation: In the network settings, you create a new entry by filling in required fields, ensuring that the parameters align with what Ethereum requires. For example, you add the Chain ID as ‘1’ and the block explorer as Etherscan, ensuring that you maintain connectivity to essential Ethereum functionalities while eliminating tracking concerns.

4. Managing Your Networks

  • Key Points:

    • You may face challenges altering existing networks.
    • It’s possible to use multiple networks simultaneously.
  • Detailed Explanation: Even though you may encounter hurdles while trying to delete the old Infura network setting, the good news is that adding a new decentralized RPC network doesn’t require you to remove the old one. By continuing to use the new RPC for transactions, you effectively mitigate the risks associated with the previous network.

5. The Corporate Influence

  • Key Points:

    • Awareness of who’s behind the tools you use is vital.
    • JP Morgan’s influence over Ethereum infrastructure serves as a cautionary example.
  • Detailed Explanation: By identifying corporate structures behind platforms like MetaMask and Infura, users can navigate their choices better. Finding out that major players like JP Morgan have stakes can alter public perception and necessitate greater scrutiny of privacy practices and decentralization ethics.

Privacy at Each Step:

  • Step 1 highlights the need for understanding control structures in crypto, where being informed fosters proactive steps towards managing privacy.
  • Step 2 & 3 stress the importance of user agency in choosing decentralized networks that enable private transactions without corporate oversight, actively eliminating centralized surveillance.
  • Step 4 touches on how users can explore a multitude of networks and be empowered in their transactions.
  • Step 5 serves as a reminder of vigilance in the crypto landscape, aligning with the decentralized ethos that blockchain technology promotes.

Examples

Graphs illustrating IP tracking risks and user statistics regarding the shift to alternative nodes can sharpen understanding. Visuals could be enhanced by including comparisons between centralized and decentralized node usage and how they respectively influence user privacy.

Hypothetical Examples:

  1. Scenario in Traditional Finance: If you order online using your bank’s app, they might also track your IP to flag unusual transactions or security risks.

  2. Scenario in Crypto Similarity: By switching to a decentralized service in crypto, akin to using private banking instead of mainstream, ensures transactional privacy.

  3. Real-World Situation: Users who switch from Infura to a decentralized RPC see improved privacy, much like consumers seeking banks that protect client data versus those that share it with third parties.

Real-World Applications

Historically, large companies have misused user data, giving rise to cryptocurrencies that prioritize user rights. Recent events highlight the necessity of robust privacy measures in the rapidly evolving crypto landscape where data tracking can lead to identity exposure.

Cause and Effect Relationships

The decision to track user IP addresses by centralized entities directly impacts how users trust and engage with cryptocurrency applications. As users become more aware, there’s a shift towards decentralized solutions that can potentially reshape the crypto ecosystem.

Challenges and Solutions

One challenge noted is the inability to delete legacy RPC settings, but users can adapt by operating multiple networks without compromising convenience. Concerns around data privacy can deter newcomers; therefore, education on utilizing alternative nodes is crucial.

Key Takeaways

  1. User Awareness: Recognizing privacy risks is vital in a centralized environment.
  2. Choosing Decentralization: Opt for decentralized RPC nodes to maintain privacy.
  3. Network Management: Multiple networks can help enhance your crypto experience while protecting your data.
  4. Understanding Corporate Ties: Identify the entities behind the tools to make informed choices.
  5. Tools for Privacy: Use resources like chainlist.org for reliable alternatives.
  6. Ease of Transition: Switching to decentralized nodes is a straightforward process.
  7. Community Engagement: Make use of forums and community input for troubleshooting.

Engaging with these takeaways allows newcomers to navigate the crypto landscape more safely and knowledgeably.

Discussion Questions and Scenarios

  1. How do centralized node services impact user trust in blockchain applications?
  2. What steps would you take to protect your IP in a traditional banking scenario compared to a crypto environment?
  3. Compare the implications of centralized versus decentralized governance in blockchain technology.
  4. How important is anonymity to you when engaging with cryptocurrency transactions?
  5. What measures are essential for a user to ensure both privacy and ease of access when interacting with dApps?
  6. How does recognizing corporate control shape user behavior in choosing their blockchain interactions?
  7. What would you consider a bonus knowledge gain from switching to decentralized RPC nodes?

Glossary

  • MetaMask: A digital wallet and browser extension enabling Ethereum asset management.
  • Infura: A service providing Ethereum nodes, potentially compromised privacy through IP tracking.
  • RPC: A communication protocol that connects clients with blockchain servers.
  • Decentralization: Distribution of authority and power in systems, essential in crypto.
  • Chain ID: Identifier denoting specific blockchain networks to ensure accurate transaction processing.
  • Ethereum Mainnet: The primary network for Ethereum transactions.
  • Blockchain Explorer: A service for tracking transaction data on blockchains.

Embrace your blockchain experience with an awareness of alternatives for privacy and enjoy navigating the evolving digital landscape!

Continue to Next Lesson

Ready to dive deeper? Join us in the next lesson of the Crypto Is FIRE (CFIRE) training program, where we uncover even more ways to maximize your crypto journey.

 

Read Video Transcript
(38) How to remove INFURA RPC NODE MetaMask IP TRACKING (Consensys) and add POLKNET RPC (Step by Step)
https://www.youtube.com/watch?v=NgEsRWNDRGw
Transcript:
 This is an emergency broadcast. If you have MetaMask then you need to listen up.  Yesterday or the day before MetaMask or Consensys, the people that own MetaMask,  announced that they will be officially collecting IP addresses. Everyone’s IP address that uses  MetaMask. Now why should you care? That means effectively they can identify you and they know exactly what you’re doing at all times.
 This defeats the point of decentralization. So how do I actually get around so that Metamask will not collect my IP address and all of this without using a VPN. So, welcome to Crypto Current.  I am your host, Crypto Rick.  And today we’re going to be discussing how to remove Infura RPC node and add an alternative node so that you don’t get tracked.
 So without further ado, let’s just get straight into it.  So this is the news.  So this is the news.  Consensus says it will collect IP addresses of MetaMask users via Infura.  Now, before you get infuriated, what is Infura?  Well, Infura is just a group of nodes.  It’s a company, effectively, and it does a lot of other things but pretty much it’s the Ethereum nodes that you interact with when you’re conducting  your Ethereum mainnet. Okay so it’s pretty much just a group of nodes that will interact with your MetaMask. And as you can see, I believe it’s a
 Chinese or Japanese company. So it’s a centralized entity.  Now to change away from Infura, these are the steps that you need to take. So the first step  is you go at the top and where it says Ethereum mainnet,  you essentially click it and then you can go down and add network as if you’re adding a custom  RPC network just like you would with Matic or whatever other chain that you’re adding.
 It’s as if you’re adding a brand new chain.  So then when you actually get to adding the network manually,  you put in Ethereum as the name, but it doesn’t really matter what name you put, the new Ethereum,  let’s call it Ethereum new. Now for the RPC URL,  you put the https2 forward slash eth- ETH dash RPC dot gateway dot poct dot network.
 So this is the new node.  So we’re changing from the old nodes.  We’re going to the new.  So before this, if you actually looked at your original Ethereum, it will say something like ETH blah blah blah  Infura and you’ll actually see Infura where it says RPC URL but you don’t want  Infura you you don’t want those nodes that they’re going to be tracking you  want nodes you know some other person’s Ethereum nodes that they can’t track so  and what’s poked don’t worry I I’ll explain it but long story short. It’s just a other node. It’s another net. It’s another node
 The chain ID you put one the number one aetherium symbol you put ETH and  The block Explorer you put ether scan dot IO so HTTPS to forward slashes ether scan dot IO  Okay, so it’s still doing everything normally it’s  still using etherscan as you know the block explorer it’s still using the same symbol  same more or less same name the only thing that’s changing is the node  the rpc right and there’s many of them there’s not just one ethereum node out there  ethereum node out there so if you don’t uh trust poked and by the way everyone’s using it and i’ve you know hypothetically i used it it’s quite safe you can actually go to a website called
 chainlist.org and it actually gives you a list of alternative nodes that you can actually plug in  so um i know some people are using this one the alchemy.com one some people are using  eth-mainnet you know that one doesn’t really matter what you pick but I mean this one it  seems to be the most easiest you know eth-rpc-gateway-poked and poked as I mentioned is a  separate node now that’s decentralized it’s not centralized that won’t collect your ip  address  so now the question is how do you actually remove the old settings
 so i actually hypothetically again tried to do this  but it wouldn’t actually let me delete the old one so we have eth mainnet  and it says here infura i actually saw a lock sign and i wasn’t able to actually  alter the original ethereum mainnet one the old one and i wasn’t able to change the rpc url and  i wasn’t possibly able to delete it now this is where I want the crypto links to comment below.
 How do you actually get  rid of the old Ethereum mainnet and more importantly even if we’re using the new  network, does the old one still pick up IP signals or is it only when you  actually use and make transactions from the new one and if presumably if you’re using  the new one then the old one won’t be sending out any signals now you will  find that once you open your new Ethereum network you will see all your  assets appear normally okay in exact amounts nothing’s lost everything  appears as normally and transactions should amounts nothing’s lost everything appears as
 normally and transactions should be fine so remember everything stays the same so  as I mentioned before and it’s no surprise to any one of you that who owns  consensus who owns metamask who owns all of ethereum critical infrastructure  well it’s obviously jp morgan and it’s stated here very publicly that jp morgan owns critical  ethereum infrastructure and that’s why the whole ethgate scenario happened and i refer you to the quote that i always tell my cryptolinks every single time  you see companies i see subsidiaries stop looking at these companies right and just saying oh
 they’re just a separate company and a consensus is separate infurious can separate metamask  separate no they are not companies.  They are subsidiaries.  You have to find that ultimately who owns all this stuff,  who has merged and acquired all this stuff,  who consolidated on all this infrastructure.  And then you will find out whether it’s a good entity or a bad entity  and act accordingly.
 And because JP Morgan are snakes and ConsenSys are snakes find out whether it’s a good entity or a bad entity and act accordingly and because jp morgan  are snakes and consensus are snakes and metamask are snakes i would highly recommend you make these  changes they literally take one minute barely anything you know it’s safe blah blah blah blah  you know it’s better to be safe than sorry and don’t let these banker snakes try and you know ruin decentralization for you.

 

(7) Metamask Wallet Default Settings Expose your IP Addresses! Do this NOW to be safe! 

Transcript:

 Previous videos I’ve shown you guys how to change your RPC settings away from  Infura because they track your IP addresses. We’ve looked at Alchemy and  Flashbots but the ChainList.org website recently updated their dashboard. If you  click on Ethereum Mainlet like that you can see  they now have an extra tab which shows if this node incorporates privacy and  does not track your videos so my previous videos are invalid except for  if you don’t want your transactions to fail with Flashbot, I suggest you still use that,

 but use a VPN with that.  But I’ll show you quickly to incorporate one  that does not track your IP addresses.  We can see the latency score,  and then we can also see a privacy.  The green dot means that it does not track your IP address.  privacy the green dot means that it does not track your IP address so if main net dot know the real dot IO this one is green on all sides we will use that one  so it will just copy the URL from here we go over to our meta mask we click the  networks up here and we will add a network. We add one manually. You can call it anything you want. We call this Ethereum Mainnet Alternative.

 does not matter what you call it we paste the RPC setting there this is the only one that has to be or this one is important to copy correctly next is  chain ID which is always one for the Ethereum://etherscan.io  and save that and there you go.  So ignore my previous videos if you changed it or just you can also copy networks by going to your settings  networks selecting any one of these and you can simply just edit the RPC  settings by pasting in a new one or you can delete the old ones and that’s what I will do

 I’ll delete the flashbots and the alchemy one  with that being said thank you for watching  and please like the video subscribe for more tips like this and I’ll see you  guys in the next video cheers bye bye