Sure there is. Who is the attacker (ISP, node, a few nodes, website, etc)? Are you a relay or an exit? The down side is that you have no membership concealment and make yourself significantly weaker to a lot of serious attacks (and yet more secure from others...although imo it is totally not worth it). I encourage people to run Tor relay nodes. Don't run a relay on the same machine you use for your client though. Or even the same internal network. VPS nodes are cheap. I highly suggest that you contribute to the Tor network by buying a cheap VPS and setting it up as a Tor relay, exit or semi-public bridge. But if you run a relay, exit or bridge on your home PC you are going to be reducing the anonymity you get as a client.