pull down to refresh

Eclipse attack is the first thing that comes to mind. If the only nodes my node makes a connection to are all run by the same person, that's very bad.

Even if your node isn't eclipsed, it might be the case that someone running a large percentage of the nodes on the network might be able to figure out where transactions originate from.

Some interesting information from Claude, that I never thought about before:

reply

I see you're already on top of this! #1463911

reply