0nekoneko7@lemmy.world to Technology@lemmy.worldEnglish · 1 year agoMulti-day DDoS storm batters Internet Archivewww.theregister.comexternal-linkmessage-square65fedilinkarrow-up1695arrow-down16cross-posted to: technology@beehaw.org
arrow-up1689arrow-down1external-linkMulti-day DDoS storm batters Internet Archivewww.theregister.com0nekoneko7@lemmy.world to Technology@lemmy.worldEnglish · 1 year agomessage-square65fedilinkcross-posted to: technology@beehaw.org
minus-squarefoggy@lemmy.worldlinkfedilinkEnglisharrow-up15arrow-down2·1 year agoWhat I wanna know is how companies get away with stuff like this. Getting to the bottom of a cyber attack isn’t… Impossible? It just takes resources.
minus-squareBestBouclettes@jlai.lulinkfedilinkEnglisharrow-up4arrow-down7·1 year agoYou just pay random people on the internet to do it, it’s fairly easy if you know where/what to ask for.
minus-squareLeadersAtWork@lemmy.worldlinkfedilinkEnglisharrow-up3·1 year agoJust about anything is traceable. The trick is making it not worth the effort.
minus-squarefoggy@lemmy.worldlinkfedilinkEnglisharrow-up1·1 year agoAsk eBay how that towing that line worked out for them.
minus-squareSethayy@sh.itjust.workslinkfedilinkEnglisharrow-up1·1 year agoSee sending ip packets is quite a lot easier that sending pig fetuses
minus-squarefoggy@lemmy.worldlinkfedilinkEnglisharrow-up1·1 year agoYes, but far more traceable! I mean, if eBay couldt cover entrails…
What I wanna know is how companies get away with stuff like this.
Getting to the bottom of a cyber attack isn’t… Impossible? It just takes resources.
You just pay random people on the internet to do it, it’s fairly easy if you know where/what to ask for.
Traceable.
Just about anything is traceable. The trick is making it not worth the effort.
Ask eBay how that towing that line worked out for them.
See sending ip packets is quite a lot easier that sending pig fetuses
Yes, but far more traceable!
I mean, if eBay couldt cover entrails…