>>23724
>that pitcher
haha, you guys really do out yourself don't you glowniggers. Yes TOR has always been compromised.
"Tor Exit Nodes are the gateways where encrypted Tor traffic hits the Internet. This means an exit node can be abused to monitor Tor traffic (after it leaves the onion network).
It is in the design of the Tor network that locating the source of that traffic through the network should be difficult to determine. However, if the exit traffic is unencrypted and contains identifying information, an exit node can be abused.
The tor project, therefore, is dependent on a diverse and wide range of exit nodes. As with any technology, you will gain the most benefit and keep your information safe by having a basic understanding of how it works. With an understanding, you will be better positioned to evaluate your risk.
The majority of exit nodes are likely not monitored and are "safe". They are managed by (((good Internet citizens))) who believe in the aims of the Tor project. However, even a handful of bad nodes are a threat as exit nodes are periodically changed as you use the Tor network."
TOR themselves say they are compromised. Also, name other networks you can use that are better then TOR, I bet you cant glownigger.