[@LegendBegins] It very much does. And I admit it was a [i]bit[/i] of hyperbole on my part since the ways in which certain groups like the FBI "cracked" the TOR network involved using an exploit with malware to de-anonymize certain users on the network who got it on their machines. I didn't go into all that, however, so as to not digress too much from the questions at hand. Plus, a lot of articles seem to overplay or confuse exactly what they did when, and exactly how it was done, so it'd be a paim to find one that was not only understandable without a technical background but accurate as well.