• SwingingTheLamp@midwest.social
    link
    fedilink
    English
    arrow-up
    9
    ·
    3 months ago

    Okay, so it looks like a number of people want to get into the weeds in analyzing this analogy, so let’s do it: People need to get places, so car traffic has a legitimate function, whereas DDoS traffic is entirely useless, right?

    But cars don’t need to get places, only people do.

    There’s some overhead in IP packets, not all of the data sent over the network is payload. It’s kept to a minimum. Perhaps we could say that a packet is like using a 10kg bicycle to move an 80kg rider. But what about using a 2,200kg vehicle to move that person? It’s like using IP packets with 27kB of headers for each 1kB of data! If lots of users hit a server with a data stream like that, and bring it to its knees, that sounds a lot like a DDoS. If that users know in advance that it’s going to bring down the server, how’s that not a DDoS?

    • SuiXi3D@fedia.io
      link
      fedilink
      arrow-up
      11
      ·
      3 months ago

      DDoS is more like everyone buying all the toilet paper all at once. At least, that’s my limited understanding. Traffic is just a bandwidth issue. Turns out that, over longer distances, we should be using fiber (trains) instead of normal cat-5.

      • UnderpantsWeevil@lemmy.world
        link
        fedilink
        English
        arrow-up
        15
        arrow-down
        1
        ·
        edit-2
        3 months ago

        DDoS is more like everyone buying all the toilet paper all at once.

        I would say its more akin to one malicious actor ordering a bunch of zombies to wander into a store, buy a roll of tolietpaper, walk over to the return counter, get a refund, and then go back to buy a roll of toilet paper, with the intent of clogging all the check out counters indefinitely.

        But the root difference is that a DDoS exists to obstruct traffic not to perform a legitimate function. A bunch of people clearing the shelves of supplies before a storm are still intent on obtaining the things. Their traffic is legitimate, not an attempt to deny other people access to the store by spoofing serious interactions.

  • FireRetardant@lemmy.world
    link
    fedilink
    English
    arrow-up
    5
    ·
    3 months ago

    Great podcast btw. Lots of guest speakers, authors, and many great stories about how car dependancy has shaped peoples and animal’s lives.

  • Ebby@lemmy.ssba.com
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    3 months ago

    That only makes sense if you don’t consider vehicle traffic, say a packet of information in this case, legitimate work.