I was wondering if the same concept also applies to mixers. In other words, if coins are sent through one mixer, then through a different mixer, can they be identified using weaknesses such as this? Does it act as a buffer to protect transaction privacy in the event one of the mixers is deanonymized?
Generally speaking, after the fact, mixer addresses are known to blockchain analysis firms. So if you send coin to a mixer and receive coin from a mixer a period of time later, a blockchain analysis firm will be able to connect both transactions to the mixer. If the mixer sends coin back to you on a not-consistent delay, takes a not-consistent fee, and/or sends coin to you in multiple transactions, it may not be clear that the send and receive transaction(s) are associated with the same person.
My concern is that if on a consistent basis, you send coin to mixer "A", and after
x period of time, you consistently send all of the coin you have received to mixer "B", you may give an adversary information they would not otherwise have access to. If mixer "A" does a very good job at obfuscating the link between the "in" and "out" transactions to/from the mixer, but mixer "B" does a poor job, you may end up worse off in terms of privacy.
The above means you need to use the mixer that is best at maintaining privacy last.
If one mixer is actually a government honeypot, or information about its users is otherwise leaked, and you use it last, the privacy you received from the first mixer will be reduced.