Thanks for sharing. I take a quick look and while you list lots of attack scenario, you forget to mention de-anonymization attack through Tor exit or VPN which leak information such as DNS request (or you intentionally left it as it's complex enough to make separate research)
You might want move this thread to
Development & Technical Discussion as you'll get more people who interested or can give better feedback.
P.S. will add comment after i done read the paper or/and try python code