Look at Google and Cloudflare creepin’ in the TOR networks? Would you just look at that? How does one kick big corporate roundly and fully out of distributed? To do so, your trustless model must become even more granular, and even more ethereal. We map and wrap at the data level. At that point, it doesn’t matter if our obfuscated, shattered, dns text string is intercepted. Yes I said text. Thanks for the free bus ride, meccas. Stay tuned…
Why is Bitcoin not truly anonymous either? Because it has been mapped in full on the other side. And because the miners are captured. That’s how.
…God bless.