0nekoneko7@lemmy.world to Technology@lemmy.worldEnglish · 1 年前Multi-day DDoS storm batters Internet Archivewww.theregister.comexternal-linkmessage-square65linkfedilinkarrow-up1694arrow-down16cross-posted to: technology@beehaw.orgtechnology@lemmy.zip
arrow-up1688arrow-down1external-linkMulti-day DDoS storm batters Internet Archivewww.theregister.com0nekoneko7@lemmy.world to Technology@lemmy.worldEnglish · 1 年前message-square65linkfedilinkcross-posted to: technology@beehaw.orgtechnology@lemmy.zip
minus-squarefoggy@lemmy.worldlinkfedilinkEnglisharrow-up15arrow-down2·1 年前What I wanna know is how companies get away with stuff like this. Getting to the bottom of a cyber attack isn’t… Impossible? It just takes resources.
minus-squareBestBouclettes@jlai.lulinkfedilinkEnglisharrow-up4arrow-down7·1 年前You just pay random people on the internet to do it, it’s fairly easy if you know where/what to ask for.
minus-squareLeadersAtWork@lemmy.worldlinkfedilinkEnglisharrow-up3·1 年前Just about anything is traceable. The trick is making it not worth the effort.
minus-squarefoggy@lemmy.worldlinkfedilinkEnglisharrow-up1·1 年前Ask eBay how that towing that line worked out for them.
minus-squareSethayy@sh.itjust.workslinkfedilinkEnglisharrow-up1·1 年前See sending ip packets is quite a lot easier that sending pig fetuses
minus-squarefoggy@lemmy.worldlinkfedilinkEnglisharrow-up1·1 年前Yes, but far more traceable! I mean, if eBay couldt cover entrails…
What I wanna know is how companies get away with stuff like this.
Getting to the bottom of a cyber attack isn’t… Impossible? It just takes resources.
You just pay random people on the internet to do it, it’s fairly easy if you know where/what to ask for.
Traceable.
Just about anything is traceable. The trick is making it not worth the effort.
Ask eBay how that towing that line worked out for them.
See sending ip packets is quite a lot easier that sending pig fetuses
Yes, but far more traceable!
I mean, if eBay couldt cover entrails…