Exclusively Relying on Tor Risks Detection and Exposure for Whistleblowers by Michael Best.
Eighteen (18) slides to remind you that just using Tor can leave you vulnerable to detection and exposure.
Depending on who you are exposing, detection may be hazardous to your freedom or even your life.
Unfortunately, like other forms of cybersecurity, avoiding detection and exposure requires effort. Effort that is rare among casual users of computers.
Depending upon your risk factors, you and your colleagues should review security practices on a regular basis.
I would include these slides and/or an adaptation of them as part of that review.
Pointers to regular security practice review cheatsheets?