LETS ASSUME A WORST CASE SCENARIO50% of MN's are run by "bad actors" or have backdoors (thru VSP provider consent)Question:Why did TOR get compromised??
Answer: NSA style traffic analysis
Just like TOR ur crypto (such as it is i.e. antiquated) is prob sound. But how do you combat NSA style traffic analysis for MN's?
Ignore me if you want
but this is another important question complements of yous truly.
Answers on a postcard
