The Following 12 Users Say Thank You to pichlo For This Useful Post: | ||
|
2015-06-26
, 18:25
|
Posts: 1,293 |
Thanked: 4,319 times |
Joined on Oct 2014
|
#12
|
The Following 8 Users Say Thank You to nieldk For This Useful Post: | ||
|
2015-06-26
, 19:37
|
|
Posts: 1,986 |
Thanked: 7,698 times |
Joined on Dec 2010
@ Dayton, Ohio
|
#13
|
Whilst I understand that IP-based defence is quick and easy, I agree with nieldk that it is not the best option. The best defence would be behavioral based.
There is no point in trying to fight it by blacklisting tor, that is my point
The Following 6 Users Say Thank You to Copernicus For This Useful Post: | ||
|
2015-06-26
, 21:58
|
|
Posts: 634 |
Thanked: 3,266 times |
Joined on May 2010
@ Colombia
|
#14
|
The Following 7 Users Say Thank You to wicket For This Useful Post: | ||
|
2015-06-26
, 22:10
|
Posts: 75 |
Thanked: 269 times |
Joined on Aug 2012
|
#15
|
By not allowing posts from new accounts for a time period
By not allowing multiple posts within XX minutes
By observing nicks of spammers and removing them (This can somewhat be scripted btw)
Anyways, that is not an excuse for blocking tor services at all.
We have also seen massive spams from certain countries, why are those countries not entirely blocked ? I will answer that myself. We dont want to harm friendly users from those counties.
Why do we want to harm friendly tor users then?
edit: aboy (D)DoS: https://www.torproject.org/docs/faq-abuse.html.en#DDoS
The Following 5 Users Say Thank You to Ilew For This Useful Post: | ||
|
2015-06-26
, 22:43
|
|
Posts: 4,118 |
Thanked: 8,901 times |
Joined on Aug 2010
@ Ruhrgebiet, Germany
|
#16
|
The Following 5 Users Say Thank You to peterleinchen For This Useful Post: | ||
|
2015-06-27
, 04:51
|
Posts: 1,293 |
Thanked: 4,319 times |
Joined on Oct 2014
|
#17
|
afaik the last attack was not only spam but more like a password-steal-attack. And all of above solutions/proposals would not have helped here.
But only blacklisting those adresses where the attack came from.
And yes it is inconvenient. But (just as an analogon): would you like to enter a plane where there is no security check at all? [me for sure not]
Not that I would like Datenvorratsspeicherung nor any other in-advance-protection-by-prediction. But tthere is a price to pay for security.
--
and always remember (at least my knowledge): the more often you use tor the more likely it is you hit an 'official' exit node (run by authorities) and getting noticed...
The Following 9 Users Say Thank You to nieldk For This Useful Post: | ||
|
2015-06-27
, 07:38
|
|
Posts: 6,447 |
Thanked: 20,981 times |
Joined on Sep 2012
@ UK
|
#18
|
The Following 10 Users Say Thank You to pichlo For This Useful Post: | ||
|
2015-06-28
, 02:04
|
Posts: 1,994 |
Thanked: 3,342 times |
Joined on Jun 2010
@ N900: Battery low. N950: torx 4 re-used once and fine; SIM port torn apart
|
#19
|
The Following 10 Users Say Thank You to Wikiwide For This Useful Post: | ||
|
2015-06-28
, 05:22
|
|
Posts: 3,141 |
Thanked: 8,161 times |
Joined on Feb 2013
@ From my Gabriola Island hermitage, near the Edge of the World
|
#20
|
The Following 5 Users Say Thank You to endsormeans For This Useful Post: | ||
Whilst I understand that IP-based defence is quick and easy, I agree with nieldk that it is not the best option. The best defence would be behavioral based. It may require more effort to set up but should be easily automated once done, with no (manual) moderating involved.