AFAIK peer-to-peer is about preventing censorship, but the author seems to assume it is about preventing surveillance. So a large part of the criticism is missing the point.
Still, it is a problem that these systems are not preventing both and it is also a problem if users expect the latter but only get the former. Protocols need to be specific about their threat model.
Still, it is a problem that these systems are not preventing both and it is also a problem if users expect the latter but only get the former. Protocols need to be specific about their threat model.