seasonone@opidea.xyz to Technology@beehaw.org · 2 years agoAttackers find new ways to deliver DDoSes with “alarming” sophisticationarstechnica.comexternal-linkmessage-square13fedilinkarrow-up143arrow-down10cross-posted to: technology@lemmy.mltechnology@lemmy.world
arrow-up143arrow-down1external-linkAttackers find new ways to deliver DDoSes with “alarming” sophisticationarstechnica.comseasonone@opidea.xyz to Technology@beehaw.org · 2 years agomessage-square13fedilinkcross-posted to: technology@lemmy.mltechnology@lemmy.world
minus-squareKresten@feddit.dklinkfedilinkarrow-up5·2 years agoIt’s a sad development, but inevitable. Eventually you can’t discern malicious traffic and real user traffic, I’m pretty curious as to what will happen then
minus-squareQuerk [they/them]@discuss.tchncs.delinkfedilinkarrow-up3·2 years agoProof of work “toll” for each request or session seems like a good option.
minus-squarerealslef@fedia.iolinkfedilinkarrow-up4·2 years agoFor everything except energy efficiency
minus-squareHirom@beehaw.orglinkfedilinkarrow-up2·2 years agoCompromised devices can do work too, and it slows down everyone. Not sure it’s the right solution.
It’s a sad development, but inevitable. Eventually you can’t discern malicious traffic and real user traffic, I’m pretty curious as to what will happen then
Proof of work “toll” for each request or session seems like a good option.
For everything except energy efficiency
Compromised devices can do work too, and it slows down everyone. Not sure it’s the right solution.
You’re probably right