If you're thinking about risks, it's important not to conflate 3 scenarios: (1) running a Tor exit node (potentially very risky), (2) running a Tor relay node, and (3) just using the Tor browser as a user (should probably be fine for most users - depends on what you use it for of course, and Tor by itself is of course not sufficient to solve all privacy issues - you can still be deanonymized if you're not careful).
Do you have any more information on how one could be deanonymized using Tor? I am aware of the browser fingerprinting and Tor themselves has a decent article about it but are there other methods that malicious parties could use?
To use an obvious example, if you log into an account you've previously logged into directly from your home computer.
More broadly, any privacy tech can be undone by poor 'operational security'. For example Ross Ulbricht - 'Dread Pirate Roberts' of Silk road - posted on StackOverflow under his own name to ask "How can I connect to a Tor hidden service using curl in php?" [1]