I am not sure just what you are calling an "attack". Is it a connection
attempt? A probe? A port test?
Also, a heads up... saying "So if you would try to DOS my system, you
will probably end up trying without success." is like a call to action.
Be careful what you ask for. A DOS on your system would actually be
trivial for many people. I dare think ebay and certain unamed government
agencies have quite robust systems and sophisticated levels of
protection, yet if I am not mistaken they have succumbed to DoS attacks.
That aside, you have some interesting graphs. Trouble is I do not
understand what they reveal. Is there a vulnerability design of Tor or
the network?
On 11/8/2013 12:19 PM, elrippo wrote:
Hy there.
I did some graphs of the attacks raiding against the network and the method is
quite interesting.
Take a look at it, maybe it helps a bit.
https://elrippoisland.net/public/tor_attack/attack.html
_______________________________________________
tor-relays mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
_______________________________________________
tor-relays mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays