What's rolling distribution?
What would you do if you do know where the hacker's database is?
Then it is not like public VPN servers?
Tor network is like a vpn?