krone9 (OP)
Newbie
Offline
Activity: 45
Merit: 0
|
|
January 26, 2014, 05:34:13 AM |
|
whoever is behind these on the various pools I use, I hate you however I am somewhat curious as to the details and mechanics ie how much difference does it actually make - I presume there is a real financial benefit or people wouldn't do it. Does it actually effect the pool or just the website reporting stats? also who is behind most DDOS attacks - are they individuals or is it big mining groups trying to dominate? just curious...
|
|
|
|
|
|
|
"I'm sure that in 20 years there will either be very large transaction volume or no volume." -- Satoshi
|
|
|
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
|
|
|
|
best-miner.com
Full Member
Offline
Activity: 123
Merit: 100
best-miner.com
|
|
January 26, 2014, 03:48:52 PM |
|
Some of them are from competitors, like if you use this one with low mining profit or unstable as the result of DDOS, as the end-miner, you will change another one.
Some may from some geeks, just for fun.
|
best-miner.com, bitcoin news & bitcoin miners 2T bitcoin miners for 2099$, 34M litecoin miners for 999$, 1T bitcoin miners for 1299$, World wide free shipping with DHL in 1 day.
|
|
|
byt411
|
|
January 26, 2014, 05:34:19 PM |
|
If they manage to DDoS down a pool, another competitor would be able to get more blocks in a way, especially if a pool like BTC guild get ddosed down.
|
|
|
|
krone9 (OP)
Newbie
Offline
Activity: 45
Merit: 0
|
|
January 31, 2014, 08:03:26 AM |
|
is it not possible to trace DDOS attacks in some way (I have no idea)
|
|
|
|
byt411
|
|
January 31, 2014, 04:57:12 PM |
|
is it not possible to trace DDOS attacks in some way (I have no idea)
It is possible to trace the DDOS attacks, to an IP address. But the hacker can easily be using a vpn or tor to hide his real IP.
|
|
|
|
Sonny
|
|
February 01, 2014, 09:48:37 AM |
|
is it not possible to trace DDOS attacks in some way (I have no idea)
For DDoS (first D stands for distributed), hacker controls a huge amount of zombie computers and use them to flood the victim's site/network. It is easy to trace the incoming packets, but it is not easy to get to the hacker behind the zombie computers.
|
|
|
|
r3wt
|
|
February 01, 2014, 09:51:45 AM |
|
you can't trace reflection attacks.
you can trace botnet attacks, but only after you detect them
sidenote: the ddos people speak of is likely just the pool owners skimping on bandwidth. the amount of getwork requests sent out on top of the site activity just wears out most pool owners 100 mbit ports.
|
My negative trust rating is reflective of a personal vendetta by someone on default trust.
|
|
|
Kluge
Donator
Legendary
Offline
Activity: 1218
Merit: 1015
|
|
February 01, 2014, 09:53:49 AM |
|
DDoS can also be part of a larger attack aimed at stealing data or otherwise compromising the site, which also bestows major benefits to competitors outside immediate financial gain, and could be done by a "non-competitor" - just an ordinary guy looking to steal money. "Competitors" don't necessarily have to be pool ops, either, but could also be industrial-scale miners. It could also simply be anti-cryptocoin folks who haven't figured out better ways of attacking the network. In a similar vein, a multi-pool DDoS could be part of a larger attack on the pools' cryptocoin of choice, possibly attempting to reduce costs of a 51% attack or similar.
|
|
|
|
krone9 (OP)
Newbie
Offline
Activity: 45
Merit: 0
|
|
February 01, 2014, 09:11:54 PM |
|
thanks for the education guys
|
|
|
|
|