Going back to the instructions not to use TOR.
The only hackers interested in hacking TOR that I know of, are governments.
Anyone know any different?
Use mr google to search for 'tor exit node vulnerability'
Here's a start.
http://hackertarget.com/tor-exit-node-visualization/