I wouldn't say that it is compromised. It is actually holding up against the adversaries defined by the Torproject - local adversaries. Torproject officially states that the Tor is not resistant against the adversaries capable to monitor large portions of the internet (internet backbone operators for example).
Your main issue is to prevent your identity leaked directly once you are Tor-compromised. Never use Tor from the IP linked to your RL ID in any way. The multinational ISP data sharing is your main problem today. Especially when it comes to the US, DE (about 50%+) and NL that make about 68% of the whole Tor traffic.
One of the public research papers states that it is enough to deanon Tor users if an adversary controls about 2% of the Tor nodes. What about 68% traffic monitoring? Guess what?
Your main issue is to prevent your identity leaked directly once you are Tor-compromised. Never use Tor from the IP linked to your RL ID in any way. The multinational ISP data sharing is your main problem today. Especially when it comes to the US, DE (about 50%+) and NL that make about 68% of the whole Tor traffic.
One of the public research papers states that it is enough to deanon Tor users if an adversary controls about 2% of the Tor nodes. What about 68% traffic monitoring? Guess what?