> You need to look into timing analysis and BGP vulnerabilities in the Tor protocol
While looking at that, also look at how those vulnerabilities apply to monero's Dandelion protocol:
Key quote: "our analysis of Dandelion and Dandelion++ indicates that they do not offer high anonymity either…an adversary that controls 20% of the nodes…[can] intercept [enough] transactions [to where] the median entropy is about five bits…equivalent to 32 possible originators per transaction."

arXiv.org
On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by Cryptocurrencies
Cryptocurrency systems can be subject to deanonimization attacks by exploiting the network-level communication on their peer-to-peer network. Adver...