http://maldomapyy5d5wn7l36mkragw3nk2fgab6tycbjlpsruch7kdninhhid.onion
At the end of this writing, we learn about a new way for every user to become a remote node while remaining anonymous simultaneously, by default. In a simple scenario where we send a transaction, for a spy node operator to be effective, they would need to run enough nodes to intercept your IP address as the true source.