seasonone@opidea.xyz to Technology@beehaw.org · 1 year agoAttackers find new ways to deliver DDoSes with “alarming” sophisticationarstechnica.comexternal-linkmessage-square13fedilinkarrow-up143arrow-down10cross-posted to: technology@lemmy.mlopidea@opidea.xyz
arrow-up143arrow-down1external-linkAttackers find new ways to deliver DDoSes with “alarming” sophisticationarstechnica.comseasonone@opidea.xyz to Technology@beehaw.org · 1 year agomessage-square13fedilinkcross-posted to: technology@lemmy.mlopidea@opidea.xyz
minus-squareKresten@feddit.dklinkfedilinkarrow-up5·1 year agoIt’s a sad development, but inevitable. Eventually you can’t discern malicious traffic and real user traffic, I’m pretty curious as to what will happen then
minus-squareQuerk [they/them]@discuss.tchncs.delinkfedilinkarrow-up3·1 year agoProof of work “toll” for each request or session seems like a good option.
minus-squareHirom@beehaw.orglinkfedilinkarrow-up2·1 year agoCompromised devices can do work too, and it slows down everyone. Not sure it’s the right solution.
It’s a sad development, but inevitable. Eventually you can’t discern malicious traffic and real user traffic, I’m pretty curious as to what will happen then
Proof of work “toll” for each request or session seems like a good option.
For everything except energy efficiency
Compromised devices can do work too, and it slows down everyone. Not sure it’s the right solution.
You’re probably right