http://g7cpug4k6ydyq5dlxrji35xnfq5n5rba3n7holux4tmdsm42ju543tad.onion
A privacy coin that chooses to enforce the usage of anonymous networks by default could also benefit from the Dandelion++ approach to relaying transactions, it could similarly benefit from increasing the number of default outgoing connections. Note Both Tor and I2P likely have spy nodes as well, but the de-anonymization process is much more expensive and complicated. Moreover, if a privacy coin chooses to disallow clearnet connections and use anonymous networks, a spy node operator will...