If you have enough of a view of the network it is running over, TOR has major weaknesses.
TOR has always been traceable to anyone with enough resources as it makes no attempt to guard against timing attacks.
TOR has never been a secure defense against a collaboration between rich states, especially if you are running permanent services with lots of users.
Also, I do not quite see the intelligence benefits of trying to hide something that is mentioned in the TOR faq, this is not a secret weakness, but something that has been a known weakness since the project's inception.
The only secret revealed here is that the security services have been busy tapping lots of stuff, but that cat has been firmly out of the bag for a while and has since had kittens.
TOR has always been traceable to anyone with enough resources as it makes no attempt to guard against timing attacks.
TOR has never been a secure defense against a collaboration between rich states, especially if you are running permanent services with lots of users.
Also, I do not quite see the intelligence benefits of trying to hide something that is mentioned in the TOR faq, this is not a secret weakness, but something that has been a known weakness since the project's inception.
The only secret revealed here is that the security services have been busy tapping lots of stuff, but that cat has been firmly out of the bag for a while and has since had kittens.