Unless it is open source and can be run locally (it is not).
In the logs of the web server there are links between the addresses somebody looked up, if browsed via Tor. Or if without Tor then also the person's IP address.
Surely you will claim that you ignore this information and you delete the logs? And people will blindly trust that?
Reminds me of the web sites where you input your credit card number or your passwords to check if they are stolen.
This looks like a honeypot.
Unless it is open source and can be run locally (it is not).
In the logs of the web server there are links between the addresses somebody looked up, if browsed via Tor. Or if without Tor then also the person's IP address.
Surely you will claim that you ignore this information and you delete the logs? And people will blindly trust that?
Reminds me of the web sites where you input your credit card number or your passwords to check if they are stolen.