http://i3xi5qxvbrngh3g6o7czwjfxwjzigook7zxzjmgwg5b7xnjcn5hzciad.onion/proposals/344-protocol-info-leaks.html
This document is likely also useful to developers of Tor-like anonymity
systems, of which there are now several, such as I2P, MASQUE, and Oxen. They
definitely share at least some, and possibly even most of these issues. Readers who are relatively new to anonymity literature may wish to first
consult the Glossary in Section 3 , especially if terms such as
Covert Channel, Path Bias, Guard Discovery, and False Positive/False Negative
are unfamiliar or hazy.