Two major attack classes Follow-the-transaction attack: Try to learn each hop of a transaction and follow it from beginning to end. Endpoint attack: Use statistics to match a transaction coming into the network to a transaction leaving the network.