Hi folks, For those who are interested, a group of security/usability academics we know did a nice analysis of the state of Tor installation/configuration approaches as of about a year ago: http://cups.cs.cmu.edu/soups/2007/proceedings/p41_clark.pdf
The link is from: http://cups.cs.cmu.edu/soups/2007/program.html If anybody wants to grab ahold of the suggestions in the paper and turn them into more concrete patches, please do. :) Enjoy, --Roger