These small but impactful changes expand the challenge space for anonymity analysis, requiring adversaries to acquire more information to breach anonymity.