"Hey guys, let's talk about the not-so-shiny side of encryption. I've been digging into VPNs, Tor, and I2P lately, and I've come across some interesting (and not-so-flattering) info about their potential vulnerabilities and the people/organizations that use them. Has anyone else explored the darker aspects of these services?"