Defending the Tor network: Mitigating IP spoofing against Tor

Agreed. At the very least, we should be informed who the perpetrator was. This is required information if for nothing else than to allow a judgement to be made by operators on whether to block the IP range in case of further issues.

The perpetrator was not shy about their activities. I would like to know who it was, or a reason why it’s being withheld.

3 Likes