Running a Full Node is Near Useless (Or The Marginal Utility of Info Security)