Re: The next stage
There have been some research papers where traffic analysis has been used to deanonymise some Bitcoin users. The researchers are usually kind enough to explain how their attack can be defeated:
E.g. http://fc14.ifca.ai/papers/fc14_submission_71.pdf