Compromised ? Maybe, but this guy doesn't provide any evidence one way or the other. He's using at least 7 other possible vectors (apparently Calculator Photo Vault just hides the gallery, no encryption, so it's over right there) which is way too many for good opsec.
With Tor the question has always been compromised exit nodes as I understand it.
governments and surveillance, name a more iconic pair