This is very immature thinking and easily bypassed.
Open Wallet1, send in 1 coin. Become a bad actor.
Open new wallet2 and send 1 coin from wallet 1--> wallet 2. Shutdown Wallet 1
Become bad actor.
Repeat that over and over and you do the math on how this can be scaled out to attack the network and as you steal more coins can exponentially grow the attack footprint.
How much does it cost to own a bad IP and be a spy on tor?
Not much, hence why Tor has already been compromised:
http://www.theverge.com/2014/7/30/5951479/tor-says-unknown-attackers-compromised-hidden-servicesYet you will probably still bitorrent porn tonight.
So Cloak's design is based on p2p bittorent porn downloads?? I dont get the correlation.
One is porn, the other is fiat transactions (real money) that can be easily targeted for stealing and or unmasking.
Consequences are vastly different. One person lightens his load, the other loses money or ends up in jail.