- From: Colin Gallagher <colingallagher.rpcv@gmail.com>
- Date: Sun, 28 Dec 2014 04:25:51 +0000
- To: Zijyfe Duufop <zdoofop@gmail.com>
- Cc: "public-web-sec." <public-web-security@w3.org>
- Message-ID: <CABghAMi5_41L_1gjDXSjDmjwjdqDr5+3CrV8f8hjZ=nXCHeCiA@mail.gmail.com>
You're not missing much. I bet you have already seen the Norse visualizations. What's bothersome is these attacks are so easy to pull off that it's not even a "man-children" or "internet of things" attribution. So the cost of association of a person or a group with a non-event becomes so low that the fruit is lower hanging for most Tor devs to let players keep playing them for attention that comes to Tor, rather that focusing on silently addressing node and certificate authority issue problems. Which they are, but with a sort of exaggerated sense of denial about the ongoing attacks. Watch and get free entertainment as some dude from Mega throws bazillions of credits around to "MAKE IT STOP" and then the hacks resume again after money is received. Sad. As I've pointed out before the reason I wouldn't agree to participate in Web Payments group or its conf calls was the ludicrous CLA which in many ways literally said, "If you call in, all your ideas are belong to us forever." Kind of like .... SONY so obv I never called in. Basically: These firms / nonprofits (often tainted by too much exposure to the infobleedment industry, eg Sony, Mega, Tor, etc) release funds to keep the hacks going a bit longer. To get attention in a market that is getting tougher (hell, look at slur.io's model - and they'll be gone soon because they don't publish keys for gpg etc). The cybercybercyber attacks (past few days mostly between US, China, with Russians watching and eating popcorn according to NORSE) made ppl run around in circles in low places, like Hollywood, White House, and a local garbage incinerator. I love my privacy (even tho I am contacting you today via gmail) but for serious comnunications I use open source and serious crypto, not this stuff. Ok ciao... happy new year On Dec 27, 2014 4:35 PM, "Zijyfe Duufop" <zdoofop@gmail.com> wrote: > Something occured to me recently: > > As you know, there has been a rash of DDoS attacks on pretty much > everything from XBox to North Korea. From what I understand, different > hacker groups are claiming responsibility for nearly every single attack. > > Now, it occurs to me that the possibility that a bunch of hackers starting > to form groups at around the same time is highly unlikely. However, there > is another interesting, and more likely explanation: new tech. > > This tech would have to make DDoS so easy, your grandmother could do it. > It would have to be affordable, reliable, adaptable, and known throughout > the hacker community, but not necessarily to the general public. It would > have to be run through a server in such a way that not one of the attacks > used can be linked. And, most importantly, it would have to be intelligent > enough to find a weak link in the destination and exploit it. If I am > correct, then man-children in basements everywhere are trying to glorify > themselves by taking down high profile targets and then boasting about it > in a way that makes them seem bigger than they are. > > Am I completely wrong? Am I missing something? Is this not even news? > Why do I feel like this is too obvious? >
Received on Sunday, 28 December 2014 04:27:34 UTC