Oddbean new post about | logout
 Thumbs up whenever possible to use reticulum. The obstacle is that it still won't solve the issue. Underneath reticulum the same IP addresses are used, therefore easy to bring down the relays.

TOR or similar VPN are still needed to keep the node safe. These nodes are already acting as VPN that isolate messages from the user IP addresses but I'm still in doubt how to make them reasonably untraceable even if slower.