Totally agree. The threat model will determine the right coinjoin implementation/approach, but fake coinjoins are almost pointless.
Totally agree. The threat model will determine the right coinjoin implementation/approach, but fake coinjoins are almost pointless.