logoalt Hacker News

woodruffwlast Sunday at 4:25 PM0 repliesview on HN

It’s a red herring because systems that achieve end-to-end security do so regardless of whether the underlying hosts are centralized or not. A typical network adversary wants you to downgrade the security properties of your protocol in the presence of an unreliable network, so they can pull more metadata out of you.