Pedantically speaking, no communication can be made 100% anonymous, but Tor (when used correctly) can greatly increase your anonymity.
In other words: DeepOnion is falsely marketing itself, and I am right. Someone understands it.
Technically yes. I am a pedant when it comes to how I speak, partly because I've been around long enough to know that no matter how you say something, someone will misinterpret you, so being clear is important. Not everyone agrees, especially on the internet. I'm willing to ignore a certain amount of imprecise wording from people online, you can't correct everyone and they seldom thank you for it. It could also be argued that "100% anonymous" is an example of marketing speak, another way to say unclear jibberish (see here
https://en.wikipedia.org/wiki/Corporate_jargon ). When was the last time your eyes didn't glaze over when a product description says something like "quantum dot technology" or "4x performance". It doesn't make it right, it's just the norm of advertising, so unless it's rife or particularly egregious, it's probably not worth fixating on.
The OpenSSL bugs you mentioned are irrelevant in my opinion, when bugs are found they are hopefully patched out asap.
They were abused long before they were discovered, and post discovery.
Yes, but every piece of software has bugs, using that as an argument is not very strong unless the bugs are found but never patched. If the software is open source, and the community is active enough that there is a reasonable expectation that due diligence has been performed, that's the best we can hope for (that heartbleed bug though
).
The attack vectors to worry about typically involve traffic analysis to de-anonymise.
Which are present.
Yes, I was giving a more compelling argument than "bugs in software". A lot of the traffic analysis that can be done comes from controlling exit nodes, which is why I went on to outline the best way I think a crypto could try to use Tor for maximal anonymity. Yes there have been (probably still are) traffic analysis attacks on hidden services, but it's still the most secure way to use Tor in all likelihood. I think for most people, a properly implemented Tor crypto is enough to consider yourself more secure than someone can be bothered with, but if you're a real multi-million dollar drug money launderer, probably taking some extra precautions would be wise