I am serious. The NSA certainly lies in its rare public statements. What I
linked to are internal top-secret slides that Edward Snowden revealed...
using Tor for all his communications.
If you insinuate that I participated to that thread under another nickname,
you are wrong.
The NSA certainly does not control every Tor node. It controls some but that
is not enough: see the slides 21 and 22 (a list of six questions) of
http://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document
for what they consider(ed?) to try with their nodes.
Complement: stupid is not really the proper adjective for the users falling
into EPICFAIL. They are more ignorant of an issue: when you access the same
site using Tor and not using it, you can be de-anonymized. That leads to a
question: does the IceCat browser let the same bookmarks
The NSA disagrees:
http://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document
With manual analysis we can de-anonymize a very small fraction of Tor users,
however, no success de-anonymizing a user in response to a TOPI request/on
demand.
The emphasis