I’ve always kept Tox in the back of my mind as it was one of the first P2P projects that really grabbed my attention.
There is a distinct lack of ability for latency-sensitive applications to be built on top of the Network, and Tox seems to be one way to get around that. Also, it seems as though they have no formal process for key exchange, something that is built right into our Network.
Tox makes no attempt to cloak your IP address when communicating with other users, as the whole point of peer-to-peer is to connect you directly to your friends. A workaround does exist in the form of tunneling your Tox connections through Tor.
– Tox Wiki
My concern is at what level on the Network’s stack would it be implemented at, how would this affect the privacy offered by the SAFE protocol, and how might those effects be mitigated?
To start, I’d say that relay nodes may be able to act as a buffer - much like the work around with Tor that they define in the quote. Or perhaps for low-latency applications cloaking your IP address may not be needed. However I would caution against this second argument as security should come first.