• Consider this, the Tor software was accepting connections from government IPs.

    Regardless of whether it was active intrusion or a significant portion of the Tor network, (at that time) had a number of governmental IP ranges in it, It’s enough to dissuade my use, at least without more significant OpSec.

    I do understand your point though.