ek on Nostr: Because effective DDoS uses massive bandwidth that you don't just have access to as ...
Because effective DDoS uses massive bandwidth that you don't just have access to as an individual or company or whatever. No one needs so much bandwidth so no one would get so much bandwidth is my educated guess.
"A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.
DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems as sources of attack traffic. Exploited machines can include computers and other networked resources such as IoT devices."
--
https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/So I would say citation required to "I am pretty sure activists have done it before without bot networks". I tried searching for "DDoS without botnet", but all I find is search hits about how to do DDoS with botnets. And I am talking about effective DDoS. Not DoS.
Published at
2023-12-28 19:59:36Event JSON
{
"id": "cc285a1c115cce421dfb845d1ec15faef21be4c8989c4a16e4048a2054ec4822",
"pubkey": "d19fec54027d097065482280ae17a68d0ad57f0f5c2fa74e24f3dbbb1e6c5495",
"created_at": 1703793576,
"kind": 1,
"tags": [
[
"e",
"be26f99d6cf48ce456cc6578ed1031932cb336e718a9f5e034add5cc465fa7a3",
"",
"root"
],
[
"e",
"30cb074c02f04e1b8a93a436926ead871159bf1cf7f738b372dded2370228db5",
"wss://relay.nostr.band/",
"reply"
],
[
"p",
"3d31f7c911f457f2dc1debdef13c5313bc3a60af2ced854da92ed9b466603064"
],
[
"p",
"fdd5e8f6ae0db817be0b71da20498c1806968d8a6459559c249f322fa73464a7"
]
],
"content": "Because effective DDoS uses massive bandwidth that you don't just have access to as an individual or company or whatever. No one needs so much bandwidth so no one would get so much bandwidth is my educated guess.\n\n\"A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.\n\nDDoS attacks achieve effectiveness by utilizing multiple compromised computer systems as sources of attack traffic. Exploited machines can include computers and other networked resources such as IoT devices.\"\n\n-- https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/\n\nSo I would say citation required to \"I am pretty sure activists have done it before without bot networks\". I tried searching for \"DDoS without botnet\", but all I find is search hits about how to do DDoS with botnets. And I am talking about effective DDoS. Not DoS.",
"sig": "b3d5dbc36c57759e5dfad169a6f8f9c66ea104ccda6a5a49f1b4603787c9d8d1c0d1fe6552b55107923ecca63e02c1439d83df37fc109a39d90d4aee149420d2"
}