Assume at all times that you’re being monitored in some form or fashion.
While this is true, I can't agree with the rest of what you're saying.
You're talking about tracing something that can't be fingerprinted. US spies use this technology to exfiltrate data from places like N Korea and China. We have operatives whose lives depend on this technology. This tech was made by the Naval Research Lab for this exact purpose. To break this shit, you need to break AES256, and if you could do that then every credit card, wire, ATM, bank transaction, every NES or facebook login, every stock market transaction would be compromised. You could move all of the world's money and break the systems that would allow reversal of that transaction. Theoretically AES256 will be broken with string theory AI and supercomputers, but we lack the programming language to define even what that design would look like.
When people say TOR can be broken, I really need more than indirect info. I've been watching this technology very closely, and the people who get caught make other mistakes that exposes them. Not encrypting their cold storage properly, leaving unencrypted backups around, getting raided for another reason and the authorities find evidence of TOR later, using a personal account while on a sensitive TOR circuit, tricking the user into running a javascript trojan, etc. I have never once found an instance where the onion routing is actually reversed. All of these attacks are nullified
If they could break TOR, they would certainly go after the child porn rings, being able to find the servers that run in perverts basements that actually host that trash. But the TOR net makes it so I can have a public server, that's always on, and that can never be found physically.