What scheme precisely are you referring to?
And “hundreds” of deanonymization attacks through Tor isn’t that bad considering that 1 vulnerability in I2P could have exposed 30,000 users.
The inclusion of I2P in a Tor configured OS was also something which made users at risk despite Tor being fine at the time.

The zero-day is in the Invisible Internet Project, or I2P, networking component that comes bundled with Tails to encrypt web traffic and hide a user’s real IP address. The 30,000 I2P users who previously felt anonymous could be unmasked, their true IP address revealed, by visiting a booby-trapped website.
Exodus explained, “The I2P vulnerability works on default, fully patched installation of Tails. No settings or configurations need to be changed for the exploit to work.” Although Tails 1.1 was released this week and closed numerous security holes, Exodus included a short video showing how to exploit I2P, even on Tails 1.1, and reveal a Tails user’s real IP address in less than two minutes. The company plans to reveal technical details of the vulnerability after the flaws in I2P are patched and pushed through to Tails.

Other than that most Tor deanonymizations come from people leaving JavaScript on which can make GET requests outside of Tor Network.