Let's say that you have a computer that is hiding behind a dedicated Tor Ethernet hotspot.
So let's assume the computer got hacked by web browser exploit.
So it is hacked, but it is still connected via a Tor Ethernet.
Therefore, the hacker can see WHAT you are doing, but not WHO you are, i.e...