2. DDOS can be mitigated by:
- moving it to proper hosting provider with DDOS protection
- move entire web traffic behind cloud firewall (this would cause privacy issues, so rather not).
Both of them would cause severe privacy issues.
Unless you can 110% trust the cloud hoster (which really is impossible unless you run the entire hosting service as well), they shouldn't be used as they would be able to log virtually everything.
Eg. OVH deals very well with DDOS attempts and you do not pay anything and preserves privacy of customers.
OVH doesn't even allow tor software to be ran on it's hardware, and you're claiming they don't log anything, or won't do so if they're asked by a LE?........
Are you sure you know what you're talking about at all?
I think you did 0 research before writing your post.
1. Where do i claim that OVH dont log anything? I said that they preserve customers privacy (dont give data easily), but they're not BF provider.
2. Chipmixer is currently hosted on vultr. Which is not any kind of bulletproof provider either, but they dont have sufficient ddos protection. Therefore moving to another one would not be any kind of issue.
3. It doesn't matter what OVH allows or doesn't. Chipmixer is already hosted on similar type of hosting of American company and seems that they do not care.
4. Running TOR Exit node results with high number of abuse complains and IP blacklist, therefore it's normal that they prohibit that - totally faulty comparison to hosting mixing service.
If you host on non-BF providers, at least move to the one which has sufficent DDOS protection.
Are you sure you know what you're talking about at all?
I see that you completely aren't, since you're not even aware where chipmixer is currently hosted, and yes it's currently in Vultr cloud.