Comment Re:Academics (Score 1) 109
The most obvious attack is control of a majority of the network, and of course correlations attacks which require access to many ISPs.
These, in addition "ownership" of VPNs, are feasibly within the capabilities of intelligence agencies.