A Look at The Onion Router (Tor)
A Look at The Onion Router (Tor)
Posted Jun 2, 2005 21:28 UTC (Thu) by giraffedata (guest, #1954)Parent article: A Look at The Onion Router (Tor)
It can also be used to protect services against denial of service attacks and the like by hiding their origin.
I'm having a hard time imagining how Tor could be used for that. It clearly can be used for the opposite: for a DOS attack (or just about any other attack) to circumvent the defenses of the victim. But how would it protect against a DOS attack?
