Remix.run Logo
exceptione 2 hours ago

Crazy. Who would have an incentive to spend resources on DDoS'ing Codeberg? The only party I can think of would be Github. I know that the normalization of ruthlessness and winner-takes-all mentality made crime mandatory for large parts of the economy, but still cannot wrap my mind around it.

Kelteseth 2 hours ago | parent | next [-]

Not just them. For example, Qt self hosted cgit got ddos just two weeks ago. No idea why random open source projects getting attacked.

> in the past 48 hours, code.qt.io has been under a persistent DDoS attack. The attackers utilize a highly distributed network of IP addresses, attempting to obstruct services and network bandwidth.

https://lists.qt-project.org/pipermail/development/2025-Nove...

rcxdude an hour ago | parent | prev | next [-]

DDoS are crazy cheap now, it could be a random person for the lulz, or just as a test or demo (though I suspect Codeberg aren't a bit enough target to be impressive there).

Sammi an hour ago | parent [-]

Is it because the s in iot stands for security? I'm asking genuinely. Where are these requests coming from?

sznio an hour ago | parent | prev | next [-]

>The only party I can think of would be Github.

I think it's not malice, but stupidity. IoT made even a script kiddie capable of running a huge botnet capable of DDoSing anything but CloudFlare.

Ygg2 2 hours ago | parent | prev | next [-]

> Who would have an incentive to spend resources

That's not how threat analysis works. That's a conspiracy theory. You need to consider the difficulty of achieving it.

Otherwise I could start speculating which large NAS provider is trying to DDoS me, when in fact it's a script kiddie.

As for who would have the most incentives? Unscrupulous AI scrapers. Every unprotected site experiences a flood of AI scrapers/bots.

theteapot an hour ago | parent [-]

Actually I think that's roughly how threat analysis works though.

Ygg2 3 minutes ago | parent [-]

For threat analysis, you need to know how hard you are to break in, what the incentives are, and who your potential adversaries are.

For each potential adversary, you list the risk strategy; that's threat analysis 101.

tonyhart7 an hour ago | parent | prev [-]

its easier for MS to buy codeberg and close it than to spent time and money to DDOS things

matrss an hour ago | parent [-]

How do you buy an e.V.?

tonyhart7 21 minutes ago | parent [-]

You goes to BYD dealership???