Deployment considerations
Weaknesses
Clients considerations
Censorship and Blocking
De-anonymization attacks
Other considerations
What is left in the protocols?
http usage