Hosting companies will take down relays if threatened. You don’t need to kill the protocol to scatter all the users.
Login to reply
Replies (1)
Barring the fact that it's really hard to know what even is a relay, you can connect to a relay with their ips or dare I say Tor urls?