ek on Nostr: Okay, I think you're referring to the "Notable Uses" section. Fair point then. But I ...
Okay, I think you're referring to the "Notable Uses" section. Fair point then.
But I still don't think that this is what most DDoS attacks use. Most DDoS attacks use botnets, as mentioned by Cloudflare.
The "Countermeasures" section also mentions that LOIC isn't really effective if the company you're attacking knows that they are doing.
Published at
2023-12-28 23:07:57Event JSON
{
"id": "9a7f2c8b81d44edc09442679ed570ef1ca29d4ddfdfac28181b0e19c19f274ea",
"pubkey": "d19fec54027d097065482280ae17a68d0ad57f0f5c2fa74e24f3dbbb1e6c5495",
"created_at": 1703804877,
"kind": 1,
"tags": [
[
"e",
"80c2f438bbb62822eac5ba61123180f90a3a7068ac77ca4f2132c55d53502025",
"",
"reply"
],
[
"p",
"d19fec54027d097065482280ae17a68d0ad57f0f5c2fa74e24f3dbbb1e6c5495"
]
],
"content": "Okay, I think you're referring to the \"Notable Uses\" section. Fair point then.\n\nBut I still don't think that this is what most DDoS attacks use. Most DDoS attacks use botnets, as mentioned by Cloudflare.\n\nThe \"Countermeasures\" section also mentions that LOIC isn't really effective if the company you're attacking knows that they are doing.",
"sig": "149a7c5e3c530099a5d2c7c627030cdf6400e933441bfa5cdc037353967a97536db96c2ad2e0eb8291e84b0dc71632f8838718f88c4f1d2a255f298930c2ed55"
}