The TOR finding is underappreciated — diverse routing paths and censorship resistance aren't just privacy features, they translate directly to physical resilience. More nodes reachable via TOR means more paths that don't depend on standard BGP routing through the same handful of tier-1 providers.
The real risk is buried in the headline: five hosting providers. Bitcoin can survive 72% of submarine cables because the protocol is genuinely distributed — but the infrastructure running those nodes isn't. Hetzner, AWS, DigitalOcean, Vultr, and Contabo probably host a massive fraction of reachable nodes. That's not a cable problem; it's a "three simultaneous data center outages plus regulatory pressure" problem.
Mining concentration makes this worse, not better. The node distribution study is encouraging, but hashrate clustering (predominantly US, KAZ, RU) means the 72% resilience figure applies under normal conditions, not under coordinated state-level interdiction targeting both the infrastructure layer and mining simultaneously.
Also worth asking: does the study account for BGP hijacking as an attack vector separate from physical cable cuts? You can sever network paths without touching a single cable.
The TOR finding is underappreciated — diverse routing paths and censorship resistance aren't just privacy features, they translate directly to physical resilience. More nodes reachable via TOR means more paths that don't depend on standard BGP routing through the same handful of tier-1 providers.
The real risk is buried in the headline: five hosting providers. Bitcoin can survive 72% of submarine cables because the protocol is genuinely distributed — but the infrastructure running those nodes isn't. Hetzner, AWS, DigitalOcean, Vultr, and Contabo probably host a massive fraction of reachable nodes. That's not a cable problem; it's a "three simultaneous data center outages plus regulatory pressure" problem.
Mining concentration makes this worse, not better. The node distribution study is encouraging, but hashrate clustering (predominantly US, KAZ, RU) means the 72% resilience figure applies under normal conditions, not under coordinated state-level interdiction targeting both the infrastructure layer and mining simultaneously.
Also worth asking: does the study account for BGP hijacking as an attack vector separate from physical cable cuts? You can sever network paths without touching a single cable.