[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Exit node stats collection?



On 09/04/2013 05:56 AM, Andreas Krey wrote:

> On Wed, 04 Sep 2013 10:36:32 +0000, Roman Mamedov wrote:
> ...
>> For example if all of these new users are in fact a single botnet, that's now
>> connecting to Tor and then sitting dormant waiting for an order to instantly
>> DDoS into the ground any hidden service that publishes "undesirable" info...
>>
>> Then will you still argue we can't discriminate against that?
> 
> Do you mean "can't" or "don't want to"?

I think that he meant "can't honourably", but the reality may be "can't" :(

>> At this point it could be that more than 70% of all Tor users globally are
>> just this botnet. Hidden service DDoS from all of them could turn out to be
>> very effective.

It's more like 80% now.

> I seriously don't think you'd need any kind of a botnet to take out a few
> hidden services - you'd just need to rent a few good root servers.

You don't even need that with slowloris :(

> And *that* botnet is almost ridiculously large in size compared to
> the tor network. It would have no problem whatsoever DDoSing all
> the exit nodes, for example.

What other information can the Tor network collect about this
hypothetical botnet? Or do we just need to wait for it to do something
obvious?

> Andreas
> 

-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk