TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Tor’s history of D/DoS attacks and future strategies for mitigation

163 pointsby jerheinzealmost 2 years ago

7 comments

cf141q5325almost 2 years ago
I think its worth mentioning that DDOS protection has become a tool to control online discourse. Once you get kicked off Cloudfare, thats mostly it for you if you have a determined attacker. Thats quite a beneficial situation for governments.
评论 #36620587 未加载
评论 #36619332 未加载
评论 #36621397 未加载
评论 #36619906 未加载
评论 #36624043 未加载
评论 #36619074 未加载
评论 #36620229 未加载
_factoralmost 2 years ago
These are likely nation state actors who have the ability to fund these attacks. I wouldn’t be surprised if they’re using advanced techniques to slow down the network and track the routes as they traverse. I would be wary of anonymity while using tor during one of these attacks.
评论 #36624988 未加载
Arch-TKalmost 2 years ago
I wish people stopped using discourse.<p>Sending pictures of pieces of hand written paper over email would be a more user friendly and usable interface than this javascript mess.
评论 #36621444 未加载
评论 #36618679 未加载
评论 #36629513 未加载
评论 #36620390 未加载
评论 #36618921 未加载
评论 #36619586 未加载
评论 #36622986 未加载
mcdonjealmost 2 years ago
Another tor page says ddos attacks primarily use UDP packets, which tor doesn&#x27;t allow:<p><a href="https:&#x2F;&#x2F;support.torproject.org&#x2F;abuse&#x2F;what-about-ddos&#x2F;" rel="nofollow noreferrer">https:&#x2F;&#x2F;support.torproject.org&#x2F;abuse&#x2F;what-about-ddos&#x2F;</a><p>So, is this an attack using a different method?<p>And what about mitigating attacks on other networks&#x2F;sites that originate from tor? The site I linked only said &quot;attackers who control enough bandwidth to launch an effective DDoS attack can do it just fine without Tor.&quot; They didn&#x27;t say anything about mitigating the use of tor by attackers. And what they&#x27;re saying about attacks not being possible on the network is clearly wrong.
评论 #36623086 未加载
评论 #36628965 未加载
yieldcrvalmost 2 years ago
I’ve heard passing mention of people switching to i2p because they feel the design choices of the Tor project are questionable - suggesting compromise. But these were vague assertions, is there more reading or ability to substantiate this?
评论 #36622119 未加载
评论 #36619587 未加载
评论 #36634112 未加载
favflamalmost 2 years ago
Has anyone tried using TOR as a replacement for Cloudflare DDOS protection? There is a single hop mode on hidden services.
评论 #36625817 未加载
评论 #36618942 未加载
评论 #36624526 未加载
评论 #36619796 未加载
yieldcrvalmost 2 years ago
What are anyones thoughts on the proof of work solution? Aside from energy use
评论 #36618906 未加载
评论 #36619677 未加载