chickentendrils@lemmy.mltoMonero@monero.town•Monero Network Scan Interesting ResultsEnglish
2·
10 hours agoThe attacker can just be smarter and use various ASNs + out-proxies for their backend.
My background is small-world network in distributed systems and anti-censorship software like Hyphanet. If the goal is to evict/lessen the purview of the metadata harvesting nodes then some version of web-of-trust + proof of work could be implemented.
I posted on here that Zelensky or his likely Azov-aligned successor would get the saddam treatment in the future. It was after that Italian occult neonazi bust with all the redirected arms from Ukraine.