you -> [encrypted data] proxy peer -> destination peer
In this case, unless all the proxy and the destination peers are controlled by policing actors they can't know who's downloading what.
you -> [encrypted data] proxy peer -> destination peer
In this case, unless all the proxy and the destination peers are controlled by policing actors they can't know who's downloading what.