Like with Tor, if we assume the adversary is running 80% of the nodes than they vcan deanonymise the transaction origin even with Dandelion.
Like with Tor, if we assume the adversary is running 80% of the nodes than they vcan deanonymise the transaction origin even with Dandelion.
No replies yet.