On Tue, 3 Sep 2013 22:02:39 +0100 Bernard Tyers - ei8fdb <ei8fdb@xxxxxxxxxx> wrote: > To answer the OP: how can we tell "malicious users" from "valid users". I understand your POV, but surely we can't discriminate? Or can we? For example if all of these new users are in fact a single botnet, that's now connecting to Tor and then sitting dormant waiting for an order to instantly DDoS into the ground any hidden service that publishes "undesirable" info... Then will you still argue we can't discriminate against that? At this point it could be that more than 70% of all Tor users globally are just this botnet. Hidden service DDoS from all of them could turn out to be very effective. That's why I think there needs to be some way to identify what majority of the users are up to. I understand that detecting which hidden service is being connected to might be hard to impossible, but exit connections are out there in the open, it is not difficult to collect stats on them. > there should be no increase in exit traffic. "They are just not using any exit connections" would also be an extremely valuable data point to have. -- With respect, Roman
Attachment:
signature.asc
Description: PGP signature
-- tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx To unsusbscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk