Scheme flooding vulnerability: how it works and why it is a threat to anonymous browsing
Here you can share your experience with the project you are suggesting or its comparison with external-protocol-flooding. Optional.
A valid email to send you a verification link when necessary or log in.