Details, Fiction and darkweb
You'll find other ways for spies, hackers or other adversaries to focus on Tor. Lewis details to your "1st Speak to issue", when an attacker places when a person moves from non-personal resources to private types, noting it has been used to detect whistleblowers. "There are actually a myriad of other attacks starting from educational to throughout