I had the impression from the various traffic analysis/traffic confirmation discussions (which I freely admit I only understand a portion of) that my ISP would have an easier time tracking my movements using TOR if I was simultaneously logged onto clearnet sites at the same time. On reflection, I don't know how this would work, and I'd be pleased to be corrected on this point.
Nah, the attacker would have to be watching the other end of your Tor circuit, either at the exit node, or at specific points between you and a hidden service, namely the hidden service directories, intro points, or the hidden service's entry guards. If an attacker is merely a local observer of all your home connections, that tells him nothing about what you are doing on the other end of a Tor circuit.
The Snowden affair has me wondering all the more about being flagged just for TOR use alone. We need to get on to a system whereby most people use onion routing and encryption making any individual user that much less worthy of further investigation.
Well, there are about 3 million people worldwide who use Tor every month for dozens of reasons, and about 250,000 in the United States, so flagging all of them would be pretty useless, which is why I don't think anyone is going on fishing expeditions against Tor users.