The reality is that true privacy requires threat modeling - what you're protecting against determines the appropriate tools and trade-offs.
For the case presented in this post, it's pretty important to have two different IPs for each exchange. And people are definitely better off using Tor than not.
The reality is that true privacy requires threat modeling - what you're protecting against determines the appropriate tools and trade-offs.
For the case presented in this post, it's pretty important to have two different IPs for each exchange. And people are definitely better off using Tor than not.