You just get a different type of threat landscape when each hop is also an opportunity to shake somebody's hand and attest that the holder of their private key is a real human. It creates a minimal trust layer you can then build on. You don't get that with a hardware address found drifting on the wind.
Both modes have some potential to attract harmful attention to network operators based on the behavior of their users, but to a very different degree. So far as I know nobody is kicking down meshtastic operators' doors looking to follow a transmission to its source, but I think that would change if the other modes of long range skulduggery were to fail.
The most resilient infrastructure would be one with no high value targets: one where each user is equally an operator.