@gameplayer @atomicpoet it's not that simple.
- Shure the average cybercriminal can use some hijacked routers and desktops as a proxy for their carding fraud but that doesn't scale with huge amounts of traffic and ISPs do combat proxy use by explicitly checking traffic for it and banning such setups as per ToS.
In fact, many ISPs will forcibly disconnect customers if they detect they run an open proxy or tor exit node.
- Speaking of @torproject, the bandwith of #ExitNodes is way too low for any industrial-scale #scraping operation needed.