Hosting companies will take down relays if threatened. You don’t need to kill the protocol to scatter all the users.

Reply to this note

Please Login to reply.

Discussion

Barring the fact that it's really hard to know what even is a relay, you can connect to a relay with their ips or dare I say Tor urls?