Wow thank you both Astor and KmfKewm. Both of your responses were very illuminating. Can I ask how you found this information?
I recommend these sources:
The Tor Wiki and Bug Tracker: https://trac.torproject.org/projects/tor
The mailing lists: https://lists.torproject.org/cgi-bin/mailman/listinfo
The anonymity bibliography: http://freehaven.net/anonbib/date.html
Also, the Whonix documentation is great: http://sourceforge.net/p/whonix/wiki/Home/
As for the google searching buyer's addresses from Tor this could be a big save for SR. There might be sellers who might not know they are compromising both their anonymity and the buyers. There needs to be a SR PSA (lol) for all the sellers.
There's no way to win this. It's useful to vendors, and they will do it regardless. If you make a big deal about it, they will lie and say they are not doing it. You have no way to catch them or call them out.
I know this has probably been asked before, but before I knew about Tor I would use it for google searches on illegal topics. I wonder if history of nodes could prove dangerous. Like now that I don't use Tor for any clearnet, could those things I searched for in the past still be used to identify me in Tor currently. I'm guessing that it can't because my connections change over time randomly?
If they could, we would have no reason to use Tor.
I had an idea, I'm not sure if its been done yet, but I was thinking of hiring a hacker to see if they could find any weak points (in SR) or just see if they could target my computer specifically (while on Tor/SR). This might make for a really really good service (in SR) for someone with hacking skills.
Why pay good money for information that academic researchers provide for free? A guy who wants to get paid is much more likely to tell you what you want to hear, or to falsify results to make his services look useful.