I think its worth mentioning that DDOS protection has become a tool to control online discourse. Once you get kicked off Cloudfare, thats mostly it for you if you have a determined attacker. Thats quite a beneficial situation for governments.
These are likely nation state actors who have the ability to fund these attacks. I wouldn’t be surprised if they’re using advanced techniques to slow down the network and track the routes as they traverse. I would be wary of anonymity while using tor during one of these attacks.
I wish people stopped using discourse.<p>Sending pictures of pieces of hand written paper over email would be a more user friendly and usable interface than this javascript mess.
Another tor page says ddos attacks primarily use UDP packets, which tor doesn't allow:<p><a href="https://support.torproject.org/abuse/what-about-ddos/" rel="nofollow noreferrer">https://support.torproject.org/abuse/what-about-ddos/</a><p>So, is this an attack using a different method?<p>And what about mitigating attacks on other networks/sites that originate from tor? The site I linked only said "attackers who control enough bandwidth to launch an effective DDoS attack can do it just fine without Tor." They didn't say anything about mitigating the use of tor by attackers. And what they're saying about attacks not being possible on the network is clearly wrong.
I’ve heard passing mention of people switching to i2p because they feel the design choices of the Tor project are questionable - suggesting compromise. But these were vague assertions, is there more reading or ability to substantiate this?