Wtf? The p2p nature of transactions broadcasting is not an attack, it'simply how a p2p network works. Since things are as such, the logical conclusion is that basically you can never assume that the creator of the transaction is the one who broadcasts it. Or better, it's reasonable to say that the node that you see as the broadcaster to you of the transaction is not the creator of the transaction.
Please read my post carefully with understanding.
The p2p nature of transactions broadcasting
I am talking about rebroadcasting. And rebroadcasting logic behaves differently for cases:
  1. you are the owner of public key (even if only on receiving site)
  2. you are not the owner of public key
And any externally visible difference for those two cases can be leveraged to deanonymize users.
reasonable to say that the node that you see as the broadcaster to you of the transaction is not the creator of the transaction.
And that's why I pointed out the 'repeatable rebroadcast' part. Single measurements obviously won't reveal the owner. But repeated measurements over time will do it faster than you would expect.