The Tor Project is a non-profit organization with the belief that Internet users should have private access to an uncensored Web. Tor accomplishes this through onion routing, which uses multi-layered encryption. Tor’s design is not flawless and different attacks are being performed to deanonymize users. In this report, we studied one of the key strategies, that Tor implemented to reduce the number of such attacks. This strategy is about assigning a list containing three guard nodes to each client. To find a lower client compromise rate, a software called COGS was used for simulation purposes. In our simulations, we changed the time interval, in which guard nodes are assigned to a user, either by decreasing it to 15 - 30 days or increasing i...