Hi On 3/3/22 21:12, awffelwaffels via tor-relays wrote: [..] ffelwaffels via tor-relays:
I see on every exit node I check on the metrics page, a massive bump in bandwidth used without a change in exit probability. Is this perhaps an attacker squeezing the bandwidth of the network so people are more likely to use their malicious nodes?
[..] Do you mean behavior like the following? Feb. 25-26.: FDAA4F76F778215F02B0B02DCE8E8504179BCDC6Cross-check: https://mcp.loki.tel/munin/par.exit.tor.loki.tel/12.par.exit.tor.loki.tel/tor_traffic.html
Feb. 25-26.: FDAA4F76F778215F02B0B02DCE8E8504179BCDC6Cross-check: https://mcp.loki.tel/munin/vie.exit.tor.loki.tel/04.vie.exit.tor.loki.tel/tor_traffic.html
I am not sure about this either. But I can't confirm this increase in my Munin graphs or on the server itself.
-- Martin
OpenPGP_0x5472B866EA6CD3DD.asc
Description: OpenPGP public key
OpenPGP_signature
Description: OpenPGP digital signature
_______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays