Damus
Zaikaboy · 3d
Wish I could have gone
Bass · 3d
Uh... Endpoint compromise, network surveillance, route probing, timing/amount correlation, LSPs become pressure points, KYC on wallets and onoff ramps, targeting users and service providers, ISP blocking, throttling, and node/IP blocking to name a feeeeew..