it's a matter of using Tor or a VPN.

also best if you connect to your own node,

or a trusted one at least,

if you send through a malicious node it can identify the real spend (although nothing before that).

Reply to this note

Please Login to reply.

Discussion

No replies yet.