Well, I have read "Tor: the second generation onion router" but it is from 2004, anything more recent about how Tor works? I am trying to understand the Sniper Attack but need more information on how tor works to do so. Also, any news about how op onymous managed to deanomyze those hidden services? Thanks in advance.