Running permissionless p2p software always has and always will come with risks.
Adjust your threat model accordingly.
Sure. One way of doing that is adjusting the permissionless p2p software to reduce the threat.
Please Login to reply.
makes sense to me