LETS ASSUME A WORST CASE SCENARIO50% of MN's are run by "bad actors" or have backdoors (thru VSP provider consent)Question:Why did TOR get compromised??
Answer: NSA style traffic analysis
Just like TOR ur crypto (such as it is i.e. antiquated) is prob sound. But how do you combat NSA style traffic analysis for MN's?
Ignore me if you want
but this is another important question complements of yous truly.
Answers on a postcard

I'll bite. Assuming there were 50% rogue nodes, each round would be an independent event, in this case 50/50 that a compromised node is selected processing the transaction. To be able to prove with reasonable doubt, you would need to have your rogue nodes selected every round, or 50%^# of rounds for probability. At 4 rounds, you're looking at a 6.25% chance of having your rogue nodes selected every round, at 8 rounds, 0.39%, at 16 rounds, .0015%. That's just as the system stands right now--with masternode blinding which is currently in development, no single node would have all the inputs so your probabilities essentially go to 0.
Good try.