KiwiFlare

Had to switch my VPN from the states to the Netherlands. What's the IP address for ping tests, again?

Edit: Looks like whatever it was is fixed. For now, at least.
 
Last edited:
Screenshot 2023-02-02 012322.png
Simple refresh fixed it.
 
This won't do anything for pure brute force DDoS from a big botnet, but it will probably make it difficult to do the application level attacks that smaller botnets use.
This is Josh we're talking about, he's white, straight and cis and never really had to learn anything beyond techbro frat coding. There are a lot of transwomen in tech out there, and every single one of them had to hone their craft diligently to have a chance at succeeding despite the odds being stacked against them. Josh doesn't stand a chance here.
 
Good work, Null. I've had to use the proof-of-work for a while now over Tor, and I sincerely appreciate that extra work was done to allow someone who uses no JavaScript, such as myself, to use the little sh program instead. I've named it kiwifarms_ddos and get the parameters out of the page so I needn't reinspect the program each time. It also helps me to regulate my usage of this website, since I don't always bother with the proof-of-work if it's late. I've been unable to use the clearnet domain when logged in, but I'll try it again soon and see.

Man, you're smart. I wish I could even begin to comprehend how to do stuff like this.
As he wrote, this is the same thing cryptocurrencies like Bitcoin use to prevent attacks on the network, and Satoshi Nakamoto didn't even think of it first; proof-of-work was earlier the main piece of Hashcash, to be used for validating e-mails; the more work done, the more legitimate the e-mail, but corporations dislike that since they want to send their spam, so e-mail is dominated by reputation instead. The only reason Cloudflare can do what it does is by having so much hardware, which is in no way suspicious for a scrappy little Internet startup conveniently giving away the disservice largely gratis. The deeper issue goes to the heart of the Internet. I've read the papers, and it truly made sense at the time, but the Internet allows packets to be fragmented, and sending nothing but incomplete fragments is one attack; TCP is also fundamentally flawed in a similar way, because it's very easy to ask for a TCP connection and never continue, but the other end must reserve state for this. Two solutions are to disable IP fragments, which is easy, and to use protocols based on UDP and carefully designed to avoid similar flaws, which isn't an option for a website.
 
If you have multiple tabs open, they will all do work, but if one finds the answer, they will share it with the other tabs.
So feel free to toss the "you are the blackest gorilla retard nigger" at me if I'm misconstruing this, but wouldn't this be easily exploitable by more techy troons who can just exploit the shared-answer part to continue to inundate the site with requests? This feels like a minor hurdle for malicious agents from how I'm interpreting it but I admit to being a technologically illiterate dilettante.
 
  • Thunk-Provoking
Reactions: Pee Cola
Back