I couldn't find what they mean with "the Netherlands is home to the largest number of non-malicious and malicious nodes combined" in Figure 1 on page 8. What differentiate a "malicious node" from a "non-malicious node"?
Otherwise it wasn't that bad, but the last paragraph is quite offensive: "In general, networks should be configured to deny access to websites such as www.torproject.org" On Thu, Aug 27, 2015 at 12:51 AM, grarpamp <[email protected]> wrote: > http://public.dhe.ibm.com/common/ssi/ecm/wg/en/wgl03086usen/WGL03086USEN.PDF > > IBM Advises Businesses To Block Tor > > With Tor-based attacks on the rise, IBM says it's time to stop Tor in > the enterprise. > > New data from IBM's X-Force research team shows steady increase in SQL > injection and distributed denial-of-service attacks as well as > vulnerability reconnaissance activity via the Tor anonymizing service. > -- > tor-talk mailing list - [email protected] > To unsubscribe or change other settings go to > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk -- tor-talk mailing list - [email protected] To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
