Hi,
you might be interested in this:
https://twitter.com/ioerror/status/509159304323416064
Why could it be relevant?
Tor Browser (and other applications?) leak the system clock in default
settings [1]. At the same time, the system clock leaks to ISP level
observers through TCP sequence numbers. This opens up to "quite simple"
end-to-end correlation attacks, I think.
Cheers,
Patrick
[1]
https://trac.torproject.org/projects/tor/ticket/3059