0nekoneko7@lemmy.world to Technology@lemmy.worldEnglish · 6 months agoMulti-day DDoS storm batters Internet Archivewww.theregister.comexternal-linkmessage-square37fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMulti-day DDoS storm batters Internet Archivewww.theregister.com0nekoneko7@lemmy.world to Technology@lemmy.worldEnglish · 6 months agomessage-square37fedilink
minus-squarefoggy@lemmy.worldlinkfedilinkEnglisharrow-up0·6 months agoWhat I wanna know is how companies get away with stuff like this. Getting to the bottom of a cyber attack isn’t… Impossible? It just takes resources.
minus-squareBestBouclettes@jlai.lulinkfedilinkEnglisharrow-up0·6 months agoYou just pay random people on the internet to do it, it’s fairly easy if you know where/what to ask for.
minus-squareXanis@lemmy.worldlinkfedilinkEnglisharrow-up0·6 months agoJust about anything is traceable. The trick is making it not worth the effort.
minus-squarefoggy@lemmy.worldlinkfedilinkEnglisharrow-up0·6 months agoAsk eBay how that towing that line worked out for them.
What I wanna know is how companies get away with stuff like this.
Getting to the bottom of a cyber attack isn’t… Impossible? It just takes resources.
You just pay random people on the internet to do it, it’s fairly easy if you know where/what to ask for.
Traceable.
Just about anything is traceable. The trick is making it not worth the effort.
Ask eBay how that towing that line worked out for them.