This is the continuation of the DDOS attack, where the subject of (((Junkerman))) was brought up. Now Voat is in lockdown mode, they cannot straight bring down Voat directly. So they still attack periodically. At first, it was about 45 minutes everyday or so. Now it is happening more frequently, several times a day. What we are seeing is some innocent and some not-so-innocent users pushing the usual Voat-is-done narrative :-).
It seems to me that often the top level voat.co is blocked but something like voat.co/v/all/new works. I’ve mentioned this elsewhere and others agreed.
I got an error from CloudFlare once. If voat is using CF, isn’t that supposed to block denial of service.
It’s like some flakey code designed to make us give up and go away. Yesterday I’d look at a post, go back, and got the message. Did my trick and got in, but that happened again several times.
If we are all logged in nowadays, wouldn’t it be simple to see which user is fucking around and delete the account?
If any account is deleted, there will be outcry that Voat is censoring certain users. But if one were to detect the troublemakers, how would you do that? How would you distinguish those from genuine users? What if they adapt to the tactic to remain hidden below certain threshold?
That url error has been reported quite a number of times. Yeah it can be very annoying.
My understanding of how denial of service works is you overload the server with requests. When voat was open this could come from an army of spambots. Now that you must be logged in, to get past voat.co a multitude of requests must be logged in. Surely the login used could be examined and blocked individually.
I suppose just hitting voat.co repeatedly could tie up the server, maybe have a separate server for that? Maybe there are tricks with delays for the voat,co login page that would be egregious for the posting pages?
@MadWorld has ignored this obvious technical nuance in the past. Don't expect him to respond to it this time, either.
The very fact that he's actually suggesting DDOS's can exist in an environment where you must be logged in to access content is ridiculous, because you would be able to isolate the accounts that are performing he DDOS and eliminate them immediately.
Ergo, complete bullshit to say it's a DDOS. The real question is, why are the Putt supporters willing to put forward this propaganda lie?
view the rest of the comments →
MadWorld ago
This is the continuation of the DDOS attack, where the subject of (((Junkerman))) was brought up. Now Voat is in lockdown mode, they cannot straight bring down Voat directly. So they still attack periodically. At first, it was about 45 minutes everyday or so. Now it is happening more frequently, several times a day. What we are seeing is some innocent and some not-so-innocent users pushing the usual Voat-is-done narrative :-).
sore_ass_losers ago
I don’t believe it’s a DDOS. It’s so flakey:
It seems to me that often the top level voat.co is blocked but something like voat.co/v/all/new works. I’ve mentioned this elsewhere and others agreed.
I got an error from CloudFlare once. If voat is using CF, isn’t that supposed to block denial of service.
It’s like some flakey code designed to make us give up and go away. Yesterday I’d look at a post, go back, and got the message. Did my trick and got in, but that happened again several times.
If we are all logged in nowadays, wouldn’t it be simple to see which user is fucking around and delete the account?
MadWorld ago
If any account is deleted, there will be outcry that Voat is censoring certain users. But if one were to detect the troublemakers, how would you do that? How would you distinguish those from genuine users? What if they adapt to the tactic to remain hidden below certain threshold?
That url error has been reported quite a number of times. Yeah it can be very annoying.
sore_ass_losers ago
My understanding of how denial of service works is you overload the server with requests. When voat was open this could come from an army of spambots. Now that you must be logged in, to get past voat.co a multitude of requests must be logged in. Surely the login used could be examined and blocked individually.
I suppose just hitting voat.co repeatedly could tie up the server, maybe have a separate server for that? Maybe there are tricks with delays for the voat,co login page that would be egregious for the posting pages?
Nosfewratsjews ago
@MadWorld has ignored this obvious technical nuance in the past. Don't expect him to respond to it this time, either.
The very fact that he's actually suggesting DDOS's can exist in an environment where you must be logged in to access content is ridiculous, because you would be able to isolate the accounts that are performing he DDOS and eliminate them immediately.
Ergo, complete bullshit to say it's a DDOS. The real question is, why are the Putt supporters willing to put forward this propaganda lie?
sore_ass_losers ago
Good to hear confirmation; I know a little about how the web works but am not an expert by any means.
What about DDOS on the top level voat.co login screen? Could that be what’s happening?