I need to look at the code or read the specification, so ... take my point of view as someone how don't know every details of the flow. If I have the power to analyze the network traffic of public nodes (not tor) I could match the broadcast with the origin and then try to look who is the owner of the node.

Reply to this note

Please Login to reply.

Discussion

That makes perfect sense. Seems that running one’s own node Tor-only would eliminate this risk, most likely.