Hello This is a question related to design of Tor If an adversary (government) have in their hands some exit nodes(ex:logs from a VPN) can identify the entry node and then the ip of the pc connected? Thank you