Even with encrypted P2P connections, powerful network adversaries (ISPs, governments, etc.) can trace the origin of many transactions
![]() | submitted by /u/bitjson to r/btc [link] [comments] |
![]() | submitted by /u/bitjson to r/btc [link] [comments] |