http://i3xi5qxvnvtjk3am4vkw3xvfecjitic3brox4tfgl6mxqyzctqudscqd.onion/tor-spec/creating-circuits.html
(As an optimization, relay implementations may delay processing onions
until a break in traffic allows time to do so without harming
network latency too greatly.) Canonical connections It is possible for an attacker to launch a man-in-the-middle attack
against a connection by telling relay Alice to extend to relay Bob at some
address X controlled by the attacker.