Tor has accused CloudFlare of using a failed methodology, which sees most requests from its platform being blocked.
“We suspect this is based on a flawed methodology by which CloudFlare labels all traffic from an IP address that has ever sent spam as malicious,” said Tor.
Tor said its IP addresses are conduits for millions of people who are then blocked from reaching websites under CloudFlare’s system.
CloudFlare said while online anonymity is important, it poses many new challenges – like providing value to online attackers.
“Based on data across the CloudFlare network, 94% of requests that we see across the Tor network are per se malicious,” said CloudFlare.
“A large percentage of the comment spam, vulnerability scanning, ad click fraud, content scraping, and login scanning comes via the Tor network,” it said.
More on Tor and security
You can be tracked online through your mouse movements
This is what happens when your computer gets infected with ransomware
Join the conversation Autoload comments
Comments section policy: MyBroadband has a new article comments policy which aims to encourage constructive discussions. To get your comments published, make sure it is civil and adds value to the discussion.