This attack still applies to hidden services. Connections to hidden services are not magically protected from timing correlation attacks. The writing is on the wall for VPN's, Tor , I2P and Proxies of all sorts. They are all dying technologies at best and dead at worst.