From a game theory perspective, if an adversary has an effective tool, defeating that tool and creating enough doubt that the adversary no longer uses the tool are equivalent.
The major vulnerabilities sound like details of implementation alone. Then there is a difference between the more easily lost privacy and the less easily lost anonymity.
Finally, people who are actual experts seem to think it remains a tool for anonymity, and explain why in a credible way.
The major vulnerabilities sound like details of implementation alone. Then there is a difference between the more easily lost privacy and the less easily lost anonymity.
Finally, people who are actual experts seem to think it remains a tool for anonymity, and explain why in a credible way.