gallium69
Suggestion added |
|
gallium69
Suggestion added |
|
gallium69
Suggestion added |
|
gallium69
Suggestion added |
|
gallium69
Suggestion added |
|
gallium69
Suggestion added |
|
gallium69
Suggestion added |
|
gallium69
Suggestion added |
|
gallium69
Suggestion added |
|
gallium69
Suggestion added |
|
gallium69
Suggestion added |
|
gallium69
Suggestion added |
|
gallium69
Suggestion added |
|
gallium69
Suggestion added |
|
gallium69
Suggestion added |
|
gallium69
Suggestion added |
|
gallium69
Suggestion added |
|
gallium69
Suggestion added |
|
gallium69
Suggestion added |
|
gallium69
Suggestion added |
|
lack of knowledge. For instance, Tor is sometimes used to conduct
[[!wikipedia Ddos#Distributed_attack desc="DDoS attacks"]]. By
doing this, the Tor relays are the ones who actually suffer from the
attack, instead of the intended target. Some people use [[!wikipedia
Peer_to_peer desc="peer-to-peer software"]] through Tor which
is bad for the network.
mancanza di nozioni. Per esempio, Tor a volte viene usato per condurre
[[!wikipedia_it Denial_of_service#DDoS desc="attacchi DDoS"]]. Facendo
questo, i relay Tor sono quelli che soffrono effettivamente
dell'attacco, in luogo del bersaglio designato. Certe persone usano [[!wikipedia_it
Peer-to-peer desc="applicazioni peer-to-peer"]] via Tor, il che
è controproducente per la rete.