A research project conducted by Carnegie Mellon University's (CMU) Software Engineering Institute (SEI) could have unmasked newly-launched Tor hidden services in just two weeks, according to a source familiar with SEI's work. The method used by the SEI may have also let other observers of the Tor network "hijack" SEI's information and de-anonymize Tor sites or users themselves.
SEI "had the ability to deanonymize a new Tor hidden service in less than two weeks," the source said. "Existing hidden services required upwards of a month, maybe even two months."
"The trick is that you have to get your attacking Tor nodes into a privileged position in the Tor network, and this is easier for new hidden services than for existing hidden services," the source, who asked to remain anonymous for fear of losing his or her job, continued.
On Wednesday, Motherboard reported that a "university-based academic research institute" had been providing information to the FBI, leading to the identification of criminal suspects on the dark web, including those allegedly involved with the now-defunct marketplace Silk Road 2.0, and a man charged with possession of child pornography.
Circumstantial evidence pointed to the SEI and an attack carried out against Tor last year. After the publication of Motherboard's report, the Tor Project claimed that CMU was paid at least $1 million for the project, and several academics who focus on the dark web said they were "livid" and "concerned" over the institute's actions...
Full article at http://motherboard.vice.com/read/tor-attack-could-unmask-new-hidden-sites-in-under-two-weeks
Even according to Snowden documents that were date back to 2006, the NSA could unmask Tor users without the help of anyone else. They will always manage to have the upper hand, whether is is from backs pored switches, 51% relay control, or countless zero days. Nothing is safe.