I know you all are dealing with DDoS and how that goes. I run DDoS mitigation for some juicy targets and do a lot of on-call response to handle those issues, so believe me when I say I know what you are dealing with.

However, that being said, it appears you are blocking tor exit nodes with a 403, likely at your web termination point (nginx, apache, whatever), and this kind of sucks.

I get that tor can bring some attacks, and I fully support a modulated response to those attacks, preferably one with a reasonable time decay, but please don’t just block all of tor

Alternatively, be one of the cool kids, and setup an onion service for lemmy.world!

  • twistypencil@lemmy.worldOP
    link
    fedilink
    arrow-up
    13
    arrow-down
    8
    ·
    edit-2
    11 months ago

    Sorry, I cannot possibly match your asymmetric post length in my replies. I’ll simply leave it at: I want to use Tor, for a lot of different reasons, not all of them are you going to eventually uncover with your argumentation, because I don’t plan on talking about them, not because they are illegal. If you don’t want to use it, then fine, its not for you. I was Tor today to get past some train internet, which is heavily filtered. Its very useful, but annoyingly I could not get to lemmy.world because tor was blocked. That ruined my enjoyment of my trip :)

    I do not agree with you that using tor actually compromises you, but if you do, then go ahead and keep believing that. Seemed to work fairly well for Snowden, and quite a lot of others who depend on it daily.