User: Password:
Subscribe / Log in / New account

A Look at The Onion Router (Tor)

A Look at The Onion Router (Tor)

Posted Jun 2, 2005 21:28 UTC (Thu) by giraffedata (subscriber, #1954)
Parent article: A Look at The Onion Router (Tor)

It can also be used to protect services against denial of service attacks and the like by hiding their origin.

I'm having a hard time imagining how Tor could be used for that. It clearly can be used for the opposite: for a DOS attack (or just about any other attack) to circumvent the defenses of the victim. But how would it protect against a DOS attack?

(Log in to post comments)

A Look at The Onion Router (Tor)

Posted Jun 3, 2005 6:41 UTC (Fri) by jwb (guest, #15467) [Link]

Tor has the ability to setup hidden services, where the client has no idea the network location of the
actual server. This prevents network DDoS attacks like packet floods, but obviously can't prevent
in-band DDoS attacks by simepl overuse of the service.

Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds