Message from @Nathan James 123
Discord ID: 643868448216055808
Does it show their mitigation?
Yes
``How does Cloudflare mitigate DNS amplification attacks?
With a properly configured firewall and sufficient network capacity (which isn't always easy to come by unless you are the size of Cloudflare), it's trivial to block reflection attacks such as DNS amplification attacks. Although the attack will target a single IP address, our Anycast network will scatter all attack traffic to the point where it is no longer disruptive. Cloudflare is able to use our advantage of scale to distribute the weight of the attack across many Data Centers, balancing the load so that service is never interrupted and the attack never overwhelms the targeted server’s infrastructure. During a recent six month window our DDoS mitigation system "Gatebot" detected 6,329 simple reflection attacks (that's one every 40 minutes), and the network successfully mitigated all of them. Learn more about Cloudflare's advanced DDoS Protection.``
Yeah, they just depend on sheer network capacity and load balancing
> With 30 Tbps of capacity, it can handle any modern distributed attack, including those targeting DNS infrastructure.
😍
they must charge a pretty penny for their service
to make it financially viable
right?
For comparision, the cables running from the UK to the USA have around 30-50 Tbps of capacity each.
I'd imagine so yeah @Crafty
OH
No, it comes as standard
they have data centers in china for their enterprise package
> All Cloudflare plans offer unlimited and unmetered mitigation of distributed denial-of-service (DDoS) attacks, regardless of the size of the attack, at no extra cost.
Fucking powerful.
How long before the Russians get the blame
Scroll down and look at some of the historical attacks
they were immediately, dubdog
not officially
Some big businesses throwing some cash to a group, getting them to attack Labour
fact is anyone can buy botnet time, but yeah
how would you prove it was a large entity
or a state
pretty hard if you covered your tracks well
Funnily enough this is what I'm studying
It's quite easy to do
You'd look at the software running on the zombie and find signatures of the authors. Style of coding, exploits used to embed the software, IPs that might be in there, etc, etc.
You would also look at the network logs, seeing where the trigger command came from
Cant wait to find out its a 18 stone libertarian autist in his bedroom
The big groups are already known, same for their signatures
They will know who did it, pretty quickly; since GCHQ will be aiding them
Although the DDOS data comes from everywhere, when you look at who sent the trigger command, that will come from common sources
https://youtu.be/vTCr23bXLRY BLOODY HELL
Think it was a false flag by some labor party member?
Those sources can then either be subpoenaed, or attacked in retaliation, or to find information
4% of leavers voting lib dem <:BIGBRAIN:501101491428392991> <:BIGBRAIN:501101491428392991>
If they used bitcoin for payment, then all those transactions are public in the blockchain. They can then track the bitcoins back to the source, etc.
yeah.. bitcoins aren't as anonymous as people think