A daily database task? Are you in sales?
You do know how TOR works, right?
Without a doubt certain agencies are capable of decrypting TLS/SSL and some probably have a good chance of identifying high-value TOR targets in a serious effort but I am pretty sure your ISP or even my country's National Intelligence Service lacks the capability to decrypt TOR traffic and the encrypted payload traffic, let alone being capable of orchestrating meaningful global timing attacks to capture all and everything in a useable daily-database-task format with a spiffy frontend.
Obviously if you go over TOR to UK based sites the packets received by the website can indeed be stored but would still be encrypted unless you do http ofcourse but in that case, you are in sales. Suppose hell froze over, packets are decrypted one way or another and The Man finds out too much about you and it foils your evil-take-over-the-world plan you could consider a second hand laptop that's not linkable to your identity in any way. Run https://tails.boum.org/ and go about your merry little evil business from some free wifi spot in the sun but mind the CCTV's and -avoid- doing anything that potentially could expose a hint of your true identity, like checking your fb stats (sales). If you are really paranoid about selling that suitcase nuke you could chain some vpn's you bought over TOR using bitcoins, scratch credit cards or paid for with blowjobs (sales again!) and mix some proxies in there for the hell of it. They can daily-database-task all they want but they will have a significant hard time finding out wtf you are doing and an even harder time discovering your true identity.