1. When using an anonymity or privacy service, it is extremely important that all traffic originating from your computer is routed through the anonymity network.
2. If any traffic flows outside of a secure connection to the network, any adversary controlling your traffic will be able to register...