What I'm talking about wrt tor is traffic shaping or node DoS leading to a Sybil attack. When the (state)actor has the ability to drop all packets from you to NON attacker-controlled guard nodes, and then once you're connected to a dirty guard, drop all connections to non-controlled relay and exit nodes, it's done. There's also an ongoing DoS attack that is able to make any guard/entry/relay/exit use 100% CPU making them unusable and it's been going on for months now. You can see it on the tor forums (relay-operators) and someone posted about it in more detail on the monero subreddit the other day.