True, but this protocol I'm describing could use proxys by default (the proxy could be on the same machine by default for those without privacy concerns, or on a remote machine if one is willing to add a bit of complexity in order to gain more privacy). Definitely a different strategy than Tor, with...