A powerful adversary, who could analyze the timing and shape of the traffic entering and exiting the Tornetwork, might be able to deanonymize Tor users.These attacks are called <i>end-to-end correlation</i> attacks, because the attacker has to observe both ends of a Tor circuit at the same time.