Yup, that makes a lot of sense. Probably something worth explicitly mentioning as a tradeoff when summarizing this network to new users.
That’s especially true if the recommendation is that people run this on their home machines. The leaked IP address is much more meaningful than some random VPS. So people should know that the transactions they send and which state they’re interested in reading are fairly simply linkable to their home’s IP.
If there was a particular piece of state that was a really juicy target, then spy nodes could try to dominate that area of the network to build a map of who reads it. That’s a little tougher on transactions, which will end up distributed randomly on the content ring every time they are issued.