The Tor Browser actually has an explicit warning about this before you download any files. Using a Qubes Disposable VM, Tails or Whonix to open files after you've downloaded them will help mitigate many of the risks (against leaks through normal operation of the file type) but not always against exploitation.
Aug 21, 2019 How to use the Tor Browser to surf the web anonymously Sep 23, 2014 6 Ways to Stay Safe From Compromised Tor Exit Nodes Stay on the Darkweb. The easiest way to stay safe from bad exit nodes is not to use them. If you … Tor Project | Anonymity Online
Oct 29, 2019
Your Environment Never use Tor from home, or near home. Never work on anything sensitive enough to require Tor from home, even if you Limit the amount of time you spend using Tor at any single location. While these correlation attacks do take some time, When you go out to perform these TOR Anonymity: Things Not To Do While Using TOR Don’t use your mobile phone for 2-Step verification on Tor. Most websites provide a 2-Step …
How to use Tor for Torrents (but there's a better option) Jun 12, 2020 5 Tips For Using The Tor Browser Safely - TechBii Jun 11, 2020 How to safely use Tor on Windows 10? : TOR