Oddbean new post about | logout
 one one hand this would be the highest privacy transaction submission method, because it shares no state with any continuously running P2P daemon that may be fingerprinted or tracked over time by spy nodes

on the other i'm not entirely sure, because if something connects to the Tor network just to drop off a transaction, that may raise some red flags and make it easier to perform some classes of timing correlations against