Indeed. The problem arises only when a malicious client exclusively uses it's own malicious relays where the fake social network is totally detached.