>>877189
>How does using a regular browser and using TOR have each to do with the other?
It's Tor, not TOR.
Scenario 1:
>you use Tor 24/7
>you periodically connect to your hidden service servers through Tor
>it's hard to correlate the access to the server with your use of Tor, because it's difficult to differentiate those particular connections with all of the other connections you're making
Scenario 2:
>you don't use Tor for most things, only for accessing your hidden service servers
>you get on Tor at 3:05pm; your hidden servers get accessed at 3:06pm; the access stops at 4:00pm; you shut down Tor at 4:01pm
Do that day after day, and it won't be much of a mystery who is accessing a Tor hidden service. LEAs might not be able to follow your traffic through the network, but they can make correlations between things happening at various endpoints. The more people who use Tor, and the more people using a particular hidden service at a given time, the harder those correlations get, but over time, they can still be made.
Tor isn't magic. People seem to forget that there are inferences that can be made without compromising the onion routing technology itself. If there's only one person in Bumfuck, Nebraska using Tor at a given time, and at that same time *someone* looks up the weather forecast for Bumfuck, Nebraska through Tor, I mean, gee, I wonder who it is.
It's for reasons like this that it's important to get as many people as possible using Tor, to use it for more than just your questionable activities, and to think about personally or geographically identifying information you might be sending over the network.