Running permissionless p2p software always has and always will come with risks. Adjust your threat model accordingly.

Replies (3)