http://bkg5ofjslnbyqvu55sjonpdyp3wmfsgq23u7vpk3wxn7ewgdeocpgwid.onion?page=article&article=Understanding+Metadata%3A+How+It+Can+Compromise+Your+Security+and+Privacy.html
For example, an attacker could analyze patterns in network traffic to determine who is using TOR and attempt to link specific communications with real-world identities. How Does the TOR Network Protect You? The TOR (The Onion Router) network is designed to protect users’ anonymity online by routing their internet traffic through multiple servers (nodes) in a global network, thus masking the user's original IP address and making it much harder to trace their activities.