http://i3xi5qxvbrngh3g6o7czwjfxwjzigook7zxzjmgwg5b7xnjcn5hzciad.onion/proposals/344-protocol-info-leaks.html
Introduction This document clarifies and expands Tor's threat model, in order to rank and
categorize existing and historical information leaks in the Tor protocol and
Tor behavior. It is also intended to be useful as a developer introduction to
hazards in Tor protocol feature design, as well as hazards in Tor client
behavior implementation.