So a state actor fills the network with nodes and conducts probing—the same attack as on the Tor network—because Lightning works like Tor and suffers from the same shortcomings.
There are many things that can be done to improve Lightning’s privacy, but LND is just as corrupt as Core, if not m...