http://i3xi5qxvbrngh3g6o7czwjfxwjzigook7zxzjmgwg5b7xnjcn5hzciad.onion/proposals/344-protocol-info-leaks.html
Under these augmented observation vectors, confirmation accuracy varies
greatly depending on traffic pattern uniqueness, traffic quantity, traffic
duration, multiplexing properties, augmented observation data retention
resolution, and the number of similar traffic flows being compared. With this in mind, while these observation vectors do not yield reliable, full
scale deanonymization by themselves, they can still do so when they are part
of a combined attack, such as with Guard Discovery...