http://g7cpug4k6ydyq5dlxrji35xnfq5n5rba3n7holux4tmdsm42ju543tad.onion
Implementing IP obfuscation will give us a good chance of never selecting the spy, since the node will be chosen randomly, as in Dandelion++ . Recommendation number 4 from the list will be particularly useful in mitigating the following experiment. This is because we have set up spy nodes from multiple ASNs, and even if the first, second and third recommendations have been followed, the anonymity set at the network level is still low enough.