Deployment considerations
Weaknesses
Clients considerations
Censorship and Blocking
De-anonymization attacks
Other considerations