Remix.run Logo
ddtaylor 3 hours ago

Did they actually run the DDoS via a script or was this a case of inserting a link and many users clicked it? They are substantially different IMO

dunder_cat 3 hours ago | parent | next [-]

https://news.ycombinator.com/item?id=46624740 has the earliest writeup that I know of. It was running it via a script and intentionally using cache busting techniques to try to increase load on the hosted wordpress infrastructure.

jsheard 3 hours ago | parent | next [-]

> It was running

It still is, uBlocks default lists are killing the script now but if it's allowed to load then it still tries to hammer the other blog.

dunder_cat 3 hours ago | parent [-]

Ah good to know. My pi-hole actually was blocking the blog itself since the ublock site list made its way into one of the blocklists I use. But I've been just avoiding links as much as possible because I didn't want to contribute.

RobotToaster 2 hours ago | parent | prev | next [-]

Given the site is hosted on wordpress.com, who don't charge for bandwidth, it seems to have been completely ineffective.

Hamuko an hour ago | parent [-]

The speculation that I saw was that they'd try to get Wordpress.com to boot him off for being a burden on the overall infrastructure.

chrisjj an hour ago | parent | next [-]

As if Wordpress.com was that dumb...

ouhamouch an hour ago | parent | prev [-]

[dead]

ddtaylor 3 hours ago | parent | prev [-]

Thank you this is exactly the information I was looking for.

"You found the smoking gun!"

hexagonwin 3 hours ago | parent | prev [-]

they silently ran the DDoS script on their captcha page (which is frequently shown to visitors, even when simply viewing and not archiving a new page)