0nekoneko7@lemmy.world to Technology@lemmy.worldEnglish · 1 month agoMulti-day DDoS storm batters Internet Archivewww.theregister.comexternal-linkmessage-square65fedilinkarrow-up1695arrow-down16cross-posted to: technology@beehaw.org
arrow-up1689arrow-down1external-linkMulti-day DDoS storm batters Internet Archivewww.theregister.com0nekoneko7@lemmy.world to Technology@lemmy.worldEnglish · 1 month agomessage-square65fedilinkcross-posted to: technology@beehaw.org
minus-squarefoggy@lemmy.worldlinkfedilinkEnglisharrow-up15arrow-down2·1 month agoWhat I wanna know is how companies get away with stuff like this. Getting to the bottom of a cyber attack isn’t… Impossible? It just takes resources.
minus-squareBestBouclettes@jlai.lulinkfedilinkEnglisharrow-up4arrow-down7·1 month agoYou just pay random people on the internet to do it, it’s fairly easy if you know where/what to ask for.
minus-squareXanis@lemmy.worldlinkfedilinkEnglisharrow-up3·1 month agoJust about anything is traceable. The trick is making it not worth the effort.
minus-squarefoggy@lemmy.worldlinkfedilinkEnglisharrow-up1·1 month agoAsk eBay how that towing that line worked out for them.
minus-squareSethayy@sh.itjust.workslinkfedilinkEnglisharrow-up1·1 month agoSee sending ip packets is quite a lot easier that sending pig fetuses
minus-squarefoggy@lemmy.worldlinkfedilinkEnglisharrow-up1·1 month agoYes, but far more traceable! I mean, if eBay couldt cover entrails…
What I wanna know is how companies get away with stuff like this.
Getting to the bottom of a cyber attack isn’t… Impossible? It just takes resources.
You just pay random people on the internet to do it, it’s fairly easy if you know where/what to ask for.
Traceable.
Just about anything is traceable. The trick is making it not worth the effort.
Ask eBay how that towing that line worked out for them.
See sending ip packets is quite a lot easier that sending pig fetuses
Yes, but far more traceable!
I mean, if eBay couldt cover entrails…