Everything not running on tor should be understood as compromised. But then it would be even better to have working i2p.