Yeah, so um... they've got some of their technical details... well they're either just straight up wrong, they're talking about an earlier protocol of Tor (despite their explicit claim to be referencing the current design), or I'm just too fucking exhausted to follow their paper. My money's on it being a prior version of the onion routing protocol. Which is pretty fucked up given their opening paragraphs; but frankly I'm too tired to read the whole thing... still, that's my opinion based on skimming their description of how the network they're attacking works. Even some of their diagrams aren't right...I wouldn't worry about this. I think they're outdated, or... fucking something, I don't know. I'll come back to it another time. Don't forget, in academia, you either publish or perish -- nobody says it has to be useful ;D