This helps a bit, thank you. I’m not really thinking about the privacy of the coins. Just the node - if Node X only broadcasts transactions filled with KYC’d UTXOs, does that effectively associate that particular node with the KYC’d identity?
Discussion
I need to look at the code or read the specification, so ... take my point of view as someone how don't know every details of the flow. If I have the power to analyze the network traffic of public nodes (not tor) I could match the broadcast with the origin and then try to look who is the owner of the node.
That makes perfect sense. Seems that running one’s own node Tor-only would eliminate this risk, most likely.