>They have been able to compromise certain Tor users in specific situations. Historically this has been done by finding an exploit for the Tor Browser Bundle or by exploiting a user that has misconfigured Tor.
I'm not touching TOR until I figure out how they managed to capture Ross Ulbricht.
He exposed his email address containing his name as a contact email for silkroad business, so he pretty much gave himself in. With that kind of "attention to details", I wouldn't be surprised if he even had misconfigured TOR.
Not exactly. He exposed his email address as a contact for bitcoin related development, then used the same username some time later as one of the first people to _discuss_ silk road. It's a tenuous connection at best, but this seemingly minor opsec lapse gave the investigators a hint to follow.
I'm not touching TOR until I figure out how they managed to capture Ross Ulbricht.
I highly doubt that he had his TOR misconfigured.