Ugh, some of the general tactics I threw out there for getting the server to cough up its info may have slight catches and flaws but the idea here is sound. You're all saying they exist in happy magic land and nobody will ever catch them. Well guess what, their web server is a computer and it's sitting somewhere connected to the internet with an ISP or host and an IP address. That means someone could find it out.
Nobody in this thread is claiming tor is invulnerable, but the ideas you've proposed are not at all sound. Now if you had said something like, hidden services can be revealed by a malicious node which advertises infinite bandwidth, causing the hidden service to preferentially route through it, you might have more credibility, though this attack can be mitigated by specifying a strict list of entry nodes. Which I'm sure the SR crew are aware of, given the ease of this potential attack and their history of continuing to operate despite the yelling about them in Congress.
Someone may compromise SR, but I think it far more likely to get infiltrated, or discovered through old fashioned sleuthing, or to have been a honeypot operation from the beginning, than through a known technical flaw.
This was not an exact clone of SR. The operators used hushmail and paypal, both of which rolled over for the feds, as anyone would have predicted. You're not even reading your own links now! FUD indeed.