New rule: if you say something as a certainty and it turns out to be complete bullshit, you get a 'I can't be trusted at all' title under your name. You get that title, please refrain from flapping your lips about things you know absolutely nothing about because your misinformation is dangerous. There are MANY 'technical solutions' for tracing Tor hidden services, here is a small selection: http://freehaven.net/anonbib/cache/hs-attack06.pdf http://www.cl.cam.ac.uk/~sjm217/papers/ccs06hotornot.pdf http://www.cl.cam.ac.uk/~sjm217/papers/usenix08clockskew.pdf you can find papers on a few dozen other methods of tracing Tor hidden services here: http://freehaven.net/anonbib/date.html and of course almost all of these papers are on pure traffic analysis / signals intelligence attacks, let's not forget that application layer attacks being used to by pass Tor are often the best solution for deanonymize Tor using targets....and last I checked these are technical solutions. Thanks for wasting your time talking out of your asshole though.