Quotedon't take this the wrong way, it sounds like you know a lot about finance but leave the security stuff to security pros. :)Why should I take this the wrong way? You've only joked about me being a cop (You're a real hoot) then used the hefty weight of your half dozen posts so far to comment on my knowledge of IT Security. I don't claim to be an expert but I'm pretty certain the public bridges aren't safer as you claim. I also wasn't saying that it was possible to prove someone had visited "location specific" tor hidden services but that through using a bridge it would be possible to mask your Tor traffic from detection in the first place.As for buying your own server, how would you do this except using a traceable method like a credit card? You see the dilemma? This is why I am toying with the idea of offering an offshore server which I have been able to obtain through anonymous means. I would share these with you but I doubt you're familiar with the ins and outs of incorporating companies and it has little to do with the thrust of this thread. I will leave OscarZulu to decide whether your understanding of node enumeration attacks is correct.In the mean time sweetheart my own advice is for you to keep your head down until you've cut your teeth a little on here, I'd be more than happy to give you any information you need.V.