you do realize that webmasters can unmask tor users as well don't you?
Not unless the user is running an old, exploitable version of the Tor browser, or doing something stupid like using flash player with socket connections enabled. If they're running something like Whonix VMs with torrent traffic going through a VPN on the host, even time correlation attacks are ineffective. This is how many of the smarter hidden service operators hide themselves from the authorities.
ya but whonix network time sync fucks up all the time. It really does, everytime its bootstrapped it should be done again, most people don't know this and 0 day attacks are still vulnerabilities. Look up whonix documentation, openvpn offshore paid with BTC on the host is kinda a must but there are still vulnerabilities in that.
Nigga I been using whonix for over a year, you can't tell me nothing
look, it's 4 fucking VM's at the SAME DAMN TIME+ openvpn on host
too bad host is mac #rekt