Create account

replied 1304d
Yes. And for nodes, if I was doing it, I would retrieve IP addresses from memo traffic, then shut it down, and observe those where those addresses connect later to find hidden nodes.
replied 1304d
I suppose it would also be possible to observe miners and see where they get memo transactions from, and find it that way. I bet there are other ways to attack it too.
replied 1304d
This of course is an arms race where both sides can improve their approaches, but most users would soon lose momentum in this war of attrition. And being a user could become illegal.
replied 1304d
"illegal" appears to be more ethical every day.
replied 1303d
Sometimes I wonder if if was always like that, and we are just late in arriving at the truth. :)