It can also be used to protect services against denial of service attacks and the like by hiding their origin.
I'm having a hard time imagining how Tor could be used for that. It clearly can be used for the opposite: for a DOS attack (or just about any other attack) to circumvent the defenses of the victim. But how would it protect against a DOS attack?
Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds