The adversary may want to correlate user identities or sessions across multiple remote services.
For instance, advertising networks may wish to know that a user who visited `site-x.com` is the same user that visited `site-y.com` to serve them targeted ads while law-enforcement may wish to associate anonymous activity on `site-b.com` with a known identity on `size-a.com` to build a criminal case.
7.**Censorship**
5.**Censorship**
`TODO: section about censorship goals`
The adversary may wish to block access to particular websites or to the entire Tor Network.