MAXI314159 on Nostr: i'm thinking most of the obfuscation would come from the peg-in and peg-out ...
i'm thinking most of the obfuscation would come from the peg-in and peg-out transactions. if surveillance is unable to track and link those 2 transactions, then it could be a viable alternative.