Abstract. We extend earlier research on mounting and resisting passive long-term end-to-end traffic analysis attacks against anonymous message systems, by describing how an eavesdropper can learn sender-receiver connections even when the substrate is a network of pool mixes, the attacker is non-global, and senders have complex behavior including generating padding messages. Additionally, we describe how an attacker can use extra information about message distinguishability to speed the attack. Finally, we simulate our attacks for a variety of scenarios, focusing on the amount of information needed to link senders to their recipients. In each scenario, we show that the intersection attack can still succeed, albeit more slowly-in some cases, so slowly as to be impractical.