Are correlation attacks and JavaScript exploits the only threats to Tor?
>>55850343
Browser fingerprinting
Cookie sniffing
etc.
>>55850368
Browser fingerprinting isn't a threat unless you're a total retard. Unless you customize the default Tor browser, this shouldn't be a problem.
>>55850343
FBI/NSA owning the nodes of the TOR chain used, effective negating what TOR gives you.
>>55850343
Well considering the fact the the geniuses over at the Tor project leave JS enabled by default and all the security settings set to "Low" you might as well just connect directly to the NSA's servers and save your self the trouble.
>>55850838
They would need to own every single node you pass through to figure out your real IP.
>>55850916
Which is easy enough since again the TTB only uses client mode by default...
>>55851134
You can choose not to connect to some nodes and enable bridging.
Firefox vulnerabilityies(you installed a tampered copy of tor or something)
OS backdoors
firmware backdoors
hardware keyloggers
vulnerability on your network hardware other than your computer
etc...