Additional questions:
- Were there any consequences for attacker? Can he easily relaunch attack from different “origin”?
- What steps were necessary for “identification” and “shutting down”? Such “guide” can be useful in case of other attacks. Previous attacks on Tor stopped because attackers got bored as far as I know. This is not how such large project as Tor should protect itself.
Honestly, I was disappointed by this blog post. So many words, but so little usable information.