nostrich
· 27w
One can layer things up. For example use Tor in a VPN connected (and as far as possible trusted VPN) virtual machine. That way if one of the layers is penetrated the other still may hold thus reducing...
layered security is wise. I wrote the above post to highlight that the privacy assumptions at the heart of much of monero's technology (and LN's too) involves trust. I don't think it's possible to completely remove trust, but you can always reduce the trust assumptions, and make things easier for end users.
In many ways I think LN does a better job of this than monero, for example, self-custodial LN wallets -- except Phoenix and Electrum -- use source routing, even on cell phones, and source routing has similar ip-hiding properties as dandelion. But monero wallets, at least on cell phones, don't even *try* to do dandelion. So a typical self-custodial LN wallet is superior to a typical self-custodial monero wallet in this respect.
๐1