http://btcmixer2e3pkn64eb5m65un5nypat4mje27er4ymltzshkmujmxlmyd.onion/help/wasabi-change-coins
However, a well-resourced attacker can perform subset sum analysis to find out which of the many inputs fund the change output. Further, during the input registration phase, the same Tor identity Alice provides input proofs for all the registered coins to the coordinator. Thus the coordinator knows that you control all these coins, and although zkSNACKs claims to not keep any logs, it is a reasonable assumption that everyone knows what the coordinator knows.