If just a single client used this option, their traffic path, all the way to the exit node, would stand out to any network attacker.
If just a single client used this option, their traffic path, all the way to the exit node, would stand out to any network attacker.