The cost is not monitoring all routers though, there is no MiTM attack in MaidSafe. The cost will be monitoring all routers etc. plus creating a huge amount of nodes (we can calculate that figure I think to be 25% of all nodes, give or take). This would be to randomly get a node near an existing node (not a group as a single node is enough for this attack).
Interesting to look more at Tor and i2p, so the connection you first make to a relay node has to be trusted I think. Then i2p carries your ip address all the way along by the looks of that to. I may be wrong here, so happy to know more. If the first connection does not need to be trusted then we should dive deep into that and see why, it could be very beneficial for sure. I cannot see how right now, but very interested to see.
If store requests were encrypted in SAFE to the Data Managers then it would evade all of this from as far as I can see, but I need to think more about that. Then it would be possible to mask even stores for known data. This could take a few shapes like direct N + P messages to the DM nodes. Then if routed via nodes with random size parts of the data, it would become near impossible to detect. I have not thought too deeply, but this is the kind of thing we love in house. Its an issue, but I don’t see it as a huge issue so far. Could prove a really nice addition though as randomising MaidManager types to route N+P type data t data managers who could then assemble back to a chunk whilst having no knowledge of the uploader could be possible.
As we do not reward on PUTs for tokens then this is possible. Good one for the Attacks section of SystemDocs for sure. I will try and add it this weekend and we can analyse it during roll out. Could have ramifications on upload caps if done very securely though, interesting angle. These chunks could be more expensive so paid in an anonymous currency perhaps Just an idea. Brainstorming here for sure.