Another approach would be a "node-id attack" where the attacker would somehow control your neighboring nodes in the P2P overlay.
This way the attacker can distinguish between transactions you created vs transactions you are merely routing.
This can be achieved by exploiting the server responsible for the mapping of nodes.
(No sure if such an attack is possible on Bitcoin, you can decide to bypass the irc channel and only connect to trusted nodes)