And if a strong adversary was able to just take more than an extremely large number of Tor nodes, it might be achievable for them to de-anonymize you by accomplishing a timing assault (matching your relationship time for you to the Tor network with identified activity from a compromised Tor exit node). Facts observed over the Deep Net is often saf