Re: Hypothesis regarding recent DDoS attacks

probably should be clearer:
     *Michael Nieves* @*virus* <https://twitter.com/virus>

These @*LizardMafia* <https://twitter.com/LizardMafia> chumps ripped their
"stresser" code from http://titaniumstresser.net  <http://t.co/BlL1YZSzXz> #
*LizardSquad* <https://twitter.com/hashtag/LizardSquad?src=hash> #
*LizardMafia* <https://twitter.com/hashtag/LizardMafia?src=hash>

On Wed, Dec 31, 2014 at 3:17 PM, Zijyfe Duufop <zdoofop@gmail.com> wrote:

> update:  It appears I was mostly correct: titaniumstresser.net
>
> On Sun, Dec 28, 2014 at 6:21 PM, Zijyfe Duufop <zdoofop@gmail.com> wrote:
>
>> Oh, my mistake.  In my first message I didn't mean new tech as in
>> gadgets, more like an app or program with the specs I gave.  If I am
>> correct, all we would have to do would be to find this new
>> website/program/app and destroy it.  I know it's a lot easier said than
>> done, but I thought I'd put it out there.
>>
>> On Sun, Dec 28, 2014 at 6:16 PM, Zijyfe Duufop <zdoofop@gmail.com> wrote:
>>
>>> I'm not sure I understand.  You started off with saying they are easy
>>> enough already and then went off on a tangent.
>>>
>>> On Sat, Dec 27, 2014 at 11:25 PM, Colin Gallagher <
>>> colingallagher.rpcv@gmail.com> wrote:
>>>
>>>> You're not missing much. I bet you have already seen the Norse
>>>> visualizations. What's bothersome is these attacks are so easy to pull off
>>>> that it's not even a "man-children" or "internet of things" attribution. So
>>>> the cost of association of a person or a group with a non-event becomes so
>>>> low that the fruit is lower hanging for most Tor devs to let players keep
>>>> playing them for attention that comes to Tor, rather that focusing on
>>>> silently addressing node and certificate authority issue problems. Which
>>>> they are, but with a sort of exaggerated sense of denial about the ongoing
>>>> attacks.
>>>>
>>>> Watch and get free entertainment as some dude from Mega throws
>>>> bazillions of credits around to "MAKE IT STOP" and then the hacks resume
>>>> again after money is received. Sad.
>>>>
>>>> As I've pointed out before the reason I wouldn't agree to participate
>>>> in Web Payments group or its conf calls was the ludicrous CLA which in many
>>>> ways literally said, "If you call in, all your ideas are belong to us
>>>> forever." Kind of like .... SONY
>>>>
>>>> so obv I never called in.
>>>>
>>>> Basically:
>>>> These firms / nonprofits (often tainted by too much exposure to the
>>>> infobleedment industry, eg Sony, Mega, Tor, etc) release funds to keep the
>>>> hacks going a bit longer. To get attention in a market that is getting
>>>> tougher (hell, look at slur.io's model - and they'll be gone soon
>>>> because they don't publish keys for gpg etc). The cybercybercyber attacks
>>>> (past few days mostly between US, China, with Russians watching and eating
>>>> popcorn according to NORSE) made ppl run around in circles in low places,
>>>> like Hollywood, White House, and a local garbage incinerator.
>>>>
>>>> I love my privacy (even tho I am contacting you today via gmail) but
>>>> for serious comnunications I use open source and serious crypto, not this
>>>> stuff.
>>>>
>>>> Ok ciao... happy new year
>>>> On Dec 27, 2014 4:35 PM, "Zijyfe Duufop" <zdoofop@gmail.com> wrote:
>>>>
>>>>> Something occured to me recently:
>>>>>
>>>>> As you know, there has been a rash of DDoS attacks on pretty much
>>>>> everything from XBox to North Korea.  From what I understand, different
>>>>> hacker groups are claiming responsibility for nearly every single attack.
>>>>>
>>>>> Now, it occurs to me that the possibility that a bunch of hackers
>>>>> starting to form groups at around the same time is highly unlikely.
>>>>> However, there is another interesting, and more likely explanation: new
>>>>> tech.
>>>>>
>>>>> This tech would have to make DDoS so easy, your grandmother could do
>>>>> it.  It would have to be affordable, reliable, adaptable, and known
>>>>> throughout the hacker community, but not necessarily to the general
>>>>> public.  It would have to be run through a server in such a way that not
>>>>> one of the attacks used can be linked.  And, most importantly, it would
>>>>> have to be intelligent enough to find a weak link in the destination and
>>>>> exploit it.  If I am correct, then man-children in basements everywhere are
>>>>> trying to glorify themselves by taking down high profile targets and then
>>>>> boasting about it in a way that makes them seem bigger than they are.
>>>>>
>>>>> Am I completely wrong?  Am I missing something?  Is this not even
>>>>> news?  Why do I feel like this is too obvious?
>>>>>
>>>>
>>>
>>
>

Received on Wednesday, 31 December 2014 20:31:34 UTC