>>5When all data going to the entry relays and all data coming out of the exit nodes is recorded, Tor can be ignored entirely. They just simply match the data from entry and exit connections. Only the connections to the hidden services inside Tor have any chance of being protected.