0
0

[–] 16204275? ago 

Yeah, they just run enough nodes, they can deanonymize you when you use theirs. They might only need to control an exit node + spy on your ISP to do it (correlate the packets).