I know you all are dealing with DDoS and how that goes. I run DDoS mitigation for some juicy targets and do a lot of on-call response to handle those issues, so believe me when I say I know what you are dealing with.

However, that being said, it appears you are blocking tor exit nodes with a 403, likely at your web termination point (nginx, apache, whatever), and this kind of sucks.

I get that tor can bring some attacks, and I fully support a modulated response to those attacks, preferably one with a reasonable time decay, but please don’t just block all of tor

Alternatively, be one of the cool kids, and setup an onion service for lemmy.world!

    • twistypencil@lemmy.worldOP
      link
      fedilink
      arrow-up
      13
      arrow-down
      9
      ·
      edit-2
      1 year ago

      Sorry, I cannot possibly match your asymmetric post length in my replies. I’ll simply leave it at: I want to use Tor, for a lot of different reasons, not all of them are you going to eventually uncover with your argumentation, because I don’t plan on talking about them, not because they are illegal. If you don’t want to use it, then fine, its not for you. I was Tor today to get past some train internet, which is heavily filtered. Its very useful, but annoyingly I could not get to lemmy.world because tor was blocked. That ruined my enjoyment of my trip :)

      I do not agree with you that using tor actually compromises you, but if you do, then go ahead and keep believing that. Seemed to work fairly well for Snowden, and quite a lot of others who depend on it daily.