Added this question from another topic discussion above.
Please demonstrate a whiteboard process of how data (origin and storage location) is obfuscated starting from the uploading node and ending at the storing node.
- How does a (relay) node know the next relay, without knowing the final destination address?
- Would there ever be an event where the uploading node sends a 1MB chunk directly to their close neighbor for storage?
Most people assume nodes will talk directly to each other in the network space. A video answer would be useful. Would it be accurate to describe XOR addresses similar to PO Box addresses? Unlike the physical world, these PO Box addresses can be accessed from any physical location.