A powerful adversary, who could analyze the timing and shape of the trafficentering and exiting the Tor network, might be able to deanonymize Torusers. These attacks are called end-to-end correlation attacks,because the attacker has to observe both ends of a Tor circuit at the sametime.