I was wondering if these unfriendly tor clients are using tor's default path selection or something else.
If they do tor exit relays would have much smaller values in their DoS stats, right?
Would any tor exit operator (listed bellow) running 0.3.3.2-alpha be willing to share (obfuscated/not exact counters) of their DoS log entries? (only if you do not have any additional firewall rules filtering packets)
| abuse@to-surf-and-protect.net | | replace k with c : kontakt @ zwiebeltoralf . de | | <rok AT sent dot com> | | florentin aatt rochet ddoott be; LTC: LhRqJZu6U87BJNSUbkACHzVQsK39hJ3sMB | | tor-relays@coldhak.ca | | abuse@to-surf-and-protect.de | | J. Random Hacker anonymizer@ccc.de | | Exit by Reporters without Borders via https://www.torservers.net/ | | Neel Chauhan <neel AT neelc DOT org> | BTC: 1KogNvxdcXydDUNrPgqgtgV3AWktKPqXpS | | Random Person <tor AT cusse.org> | | OctaneZ-TOR OctaneZ+toroperator@gmail.com | | https://www.torservers.net/donate.html <support .AT. torservers .DOT. net> | | shallot protonmail com | | Random Person <killertor.abuse at gmail point com> | | Brandon Kuschel <kusch023 AT NOSPAM umn dot edu> | | <admin AT openbsd DOT se> |