Silk Road forums
Discussion => Silk Road discussion => Topic started by: venomballs on April 30, 2013, 02:14 am
-
I was actually thinking before the update: to suggest splitting up the user database alphabetically maybe? usernames starting with A gets it "own" website, B... C... D...
This would divide the traffic into 26 sites/domains... add the second letter and you have 676 websites to attack...
Different parts of the website get hosting on different domains maybe? Not a pro at this myself.. but sure some of us are.
I am quite confident DPR will eventually be able to fight this off.. at least to retrieve our funds. But my bet is on SR surviving this overall. Even if things are starting to look gloomy, there is always a way out! We can get the idea ball rolling.
A question I actually had was: the forums seem to be decently easy to get to once again... how come? is the attacker concentrating on SR again?
If so: why? Does he benefit from us using forums? Is he putting all his resources in to attacking the site it self? What is going on?
My theory, like many of yours, once again: competition or LE. But still I am somewhat perplexed. What is this game being played?
What exactly is so special about this DDOS attack? Since the part 1 of the fight - what has changed? How come we came out on top, but ended up being fucked again?
What solutions are possible? How can we help? What tactics can we implement as a counter-offensive/defensive strategy? like many have said.. a lot of smart people on here. I am sure we can come up with something! I think if things aren't looking good, our leader should eventually be able to reach out to the community.. or we reach out to him? there is nothing impossible if you put your mind to it. We have thousands.
Personally.. I wish I could do more to help. All I can do for now is provide my support and believe in the cause that is freedom. believe in SR.
That being said: Fuck you DDOSer. Go get altarboyd.
-
How about a secret mirror-version of SR running, only given out to active long-term vendors and buyers..
-
interesting info TwoHat. once again im not well versed in this shit but interesting nonetheless. 3rd one suggests changing/complicating the infrastructure and weeding out the ddos flood on one of the branches from wat i understood?
@tea_drinker : mirrors still reflect to the actual website tho no? couldn't an attack be directed through them or even directly at sr-central?
also: vendors and buyers? dont think many people would be up for that. even mods... imagine if some LE gets on to even one of those? wouldnt they be able to essentially spy on the traffic going through? tht wud be bad.
maybe setting up a couple or more hidden (non user) mirrors that split the traffic and weed out floods? + the playing with the configuration of the host it self?
-
How about a secret mirror-version of SR running, only given out to active long-term vendors and buyers..
So, how do you suppose to get known those addresses in case the site is denial of service?
-
How about a secret mirror-version of SR running, only given out to active long-term vendors and buyers..
So, how do you suppose to get known those addresses in case the site is denial of service?
Hmm maybe unique sub-domains (is that possible even) w/ tracking, distributed to the 'trusted' users during up-time.
Each subdomain would be unique, giving us a way to track it (in-case somebody tries to DDOS it).. There would be nothing to DDOS hosted on the main domain. Hm is that even possible?
Ok to be honest I have no idea..
-
Hm is that even possible?
Everything is possible. But unfortunately that doesn't solve the tor connection bandwidth problem.