The Tor anonymity network is the world's most used decentralized anonymity system, relied on by activists, whistleblowers, human rights advocates, police, and privacy-concerned users. Despite it's large adoption, it still suffers from many issues; Tor is vulnerable to traffic confirmation attacks, suffers from many usability issues, and doesn't contain features that could be useful for some of its target audiences, such as whistleblowers. In this talk, Kevin will discuss previous and current works examining how k-anonymity and differential privacy can be used to improve resistance against traffic analysis attacks, current work looking to improve anonymous bug reports for Tor Browser UX issues, and new systems built to aid Tor in the use cases of whistleblowing and censorship circumvention.