> You need to look into timing analysis and BGP vulnerabilities in the Tor protocol
While looking at that, also look at how those vulnerabilities apply to monero's Dandelion protocol: https://arxiv.org/abs/2201.11860
Key quote: "our analysis of Dandelion and Dandelion++ indicates that they do not offer high anonymity either…an adversary that controls 20% of the nodes…[can] intercept [enough] transactions [to where] the median entropy is about five bits…equivalent to 32 possible originators per transaction."