@0nekoneko7@lemmy.world to Technology@lemmy.worldEnglish • 7 months agoMulti-day DDoS storm batters Internet Archivewww.theregister.comexternal-linkmessage-square65fedilinkarrow-up1694arrow-down16cross-posted to: technology@beehaw.orgtechnology@lemmy.zip
arrow-up1688arrow-down1external-linkMulti-day DDoS storm batters Internet Archivewww.theregister.com@0nekoneko7@lemmy.world to Technology@lemmy.worldEnglish • 7 months agomessage-square65fedilinkcross-posted to: technology@beehaw.orgtechnology@lemmy.zip
minus-square@foggy@lemmy.worldlinkfedilinkEnglish13•7 months agoWhat I wanna know is how companies get away with stuff like this. Getting to the bottom of a cyber attack isn’t… Impossible? It just takes resources.
minus-square@BestBouclettes@jlai.lulinkfedilinkEnglish-3•7 months agoYou just pay random people on the internet to do it, it’s fairly easy if you know where/what to ask for.
minus-squareLeadersAtWorklinkfedilinkEnglish3•7 months agoJust about anything is traceable. The trick is making it not worth the effort.
minus-square@foggy@lemmy.worldlinkfedilinkEnglish1•7 months agoAsk eBay how that towing that line worked out for them.
minus-square@Sethayy@sh.itjust.workslinkfedilinkEnglish1•7 months agoSee sending ip packets is quite a lot easier that sending pig fetuses
minus-square@foggy@lemmy.worldlinkfedilinkEnglish1•7 months agoYes, but far more traceable! I mean, if eBay couldt cover entrails…
What I wanna know is how companies get away with stuff like this.
Getting to the bottom of a cyber attack isn’t… Impossible? It just takes resources.
You just pay random people on the internet to do it, it’s fairly easy if you know where/what to ask for.
Traceable.
Just about anything is traceable. The trick is making it not worth the effort.
Ask eBay how that towing that line worked out for them.
See sending ip packets is quite a lot easier that sending pig fetuses
Yes, but far more traceable!
I mean, if eBay couldt cover entrails…