John Young wrote: > "Also keep in mind that there are no confirmed on the record cases to > date of a Tor 'break/weakness' having been used to find a user. It > appears to be only user error." > > One of the perdurable claims of comsec promoters is that comsec > breaks and weaknesses inevitably turn out to be user errors. Exactly > who the fictitious user is remains obscure but assuredly means > somebody other than the comsec promoter user who inevitably > offers a greatly improved product, trust them.
If your hidden service isn't a clusterfuck of unpatched Apache and sketchy PHP scripts, then it's not likely to get taken down or located. If you're a terrible webmaster, you're obviously running a huge risk with running a website, even if it is a hidden service. Tor isn't magic. It can't magically make a terrible website awesome. It just adds additional security -- it can't be the *entire* security plan. ~Griffin
