They use Tor, so their threat models are very similar.