I was wondering if these unfriendly tor clients are using tor's default
path selection or something else.

If they do tor exit relays would have much smaller values in their DoS stats, 
right?

Would any tor exit operator (listed bellow) running 0.3.3.2-alpha be willing to 
share (obfuscated/not exact
counters) of their DoS log entries? (only if you do not have any additional 
firewall rules filtering packets)



| [email protected]                                                 
 |
| replace k with c : kontakt @ zwiebeltoralf . de                               
 |
| <rok AT sent dot com>                                                         
 |
| florentin aatt rochet ddoott be; LTC: LhRqJZu6U87BJNSUbkACHzVQsK39hJ3sMB      
 |
| [email protected]                                                         
 |
| [email protected]                                                  
 |
| J. Random Hacker <[email protected]>                                          
 |
| Exit by Reporters without Borders via https://www.torservers.net/             
 |
| Neel Chauhan <neel AT neelc DOT org> | BTC: 
1KogNvxdcXydDUNrPgqgtgV3AWktKPqXpS |
| Random Person <tor AT cusse.org>                                              
 |
| OctaneZ-TOR  <[email protected]>                                  
 |
| https://www.torservers.net/donate.html <support .AT. torservers .DOT. net>    
 |
| shallot protonmail com                                                        
 |
| Random Person <killertor.abuse at gmail point com>                            
 |
| Brandon Kuschel <kusch023 AT NOSPAM umn dot edu>                              
 |
| <admin AT openbsd DOT se>                                                     
 |


-- 
https://mastodon.social/@nusenu
twitter: @nusenu_

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
tor-relays mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Reply via email to