That's, when Tor releases memory again on the procedure, the parts of memory are fragmented so that they're challenging to reuse. 2nd, there are a few extra esoteric attacks that aren't too-understood or very well-tested that entail making use of the know-how that you're functioning a relay -- for instance, https://anthonyy863nrv5.bloguerosa.com/profile