Well even if you did enter through a compromised node, it doesn’t know where the middle node is at, same for the last node.
They would need to have all three nodes compromised in order to trace. Aren’t the nodes randomized as well when making a connection? If I’m understanding it correctly.
Well even if you did enter through a compromised node, it doesn’t know where the middle node is at, same for the last node.
They would need to have all three nodes compromised in order to trace. Aren’t the nodes randomized as well when making a connection? If I’m understanding it correctly.