Comment Application vs. server (Score 1) 251
I might be missing something, but isn't it usually easier to get a back door into software than to seize a server? Reading the articles it's using or piggybacking on P2P, but you have to get the software from -somewhere- initially, and I assume there will be updates. Even if those updates are pushed out via the integrated P2P network, I'd imagine there's still ways they could compromise it. And wouldn't the tracking of user names make things more dangerous should the software be compromised?