http://maldomapyy5d5wn7l36mkragw3nk2fgab6tycbjlpsruch7kdninhhid.onion
Even if an adversary has determined which transaction was created by which hidden service, it tells them very little since the user's IP address is hidden. The attack becomes more expensive and challenging because they would need to spy on Tor at the same time.