Menu
News
All News
Dungeons & Dragons
Level Up: Advanced 5th Edition
Pathfinder
Starfinder
Warhammer
2d20 System
Year Zero Engine
Industry News
Reviews
Dragon Reflections
White Dwarf Reflections
Columns
Weekly Digests
Weekly News Digest
Freebies, Sales & Bundles
RPG Print News
RPG Crowdfunding News
Game Content
ENterplanetary DimENsions
Mythological Figures
Opinion
Worlds of Design
Peregrine's Nest
RPG Evolution
Other Columns
From the Freelancing Frontline
Monster ENcyclopedia
WotC/TSR Alumni Look Back
4 Hours w/RSD (Ryan Dancey)
The Road to 3E (Jonathan Tweet)
Greenwood's Realms (Ed Greenwood)
Drawmij's TSR (Jim Ward)
Community
Forums & Topics
Forum List
Latest Posts
Forum list
*Dungeons & Dragons
Level Up: Advanced 5th Edition
D&D Older Editions
*TTRPGs General
*Pathfinder & Starfinder
EN Publishing
*Geek Talk & Media
Search forums
Chat/Discord
Resources
Wiki
Pages
Latest activity
Media
New media
New comments
Search media
Downloads
Latest reviews
Search resources
EN Publishing
Store
EN5ider
Adventures in ZEITGEIST
Awfully Cheerful Engine
What's OLD is NEW
Judge Dredd & The Worlds Of 2000AD
War of the Burning Sky
Level Up: Advanced 5E
Events & Releases
Upcoming Events
Private Events
Featured Events
Socials!
EN Publishing
Twitter
BlueSky
Facebook
Instagram
EN World
BlueSky
YouTube
Facebook
Twitter
Twitch
Podcast
Features
Top 5 RPGs Compiled Charts 2004-Present
Adventure Game Industry Market Research Summary (RPGs) V1.0
Ryan Dancey: Acquiring TSR
Q&A With Gary Gygax
D&D Rules FAQs
TSR, WotC, & Paizo: A Comparative History
D&D Pronunciation Guide
Million Dollar TTRPG Kickstarters
Tabletop RPG Podcast Hall of Fame
Eric Noah's Unofficial D&D 3rd Edition News
D&D in the Mainstream
D&D & RPG History
About Morrus
Log in
Register
What's new
Search
Search
Search titles only
By:
Forums & Topics
Forum List
Latest Posts
Forum list
*Dungeons & Dragons
Level Up: Advanced 5th Edition
D&D Older Editions
*TTRPGs General
*Pathfinder & Starfinder
EN Publishing
*Geek Talk & Media
Search forums
Chat/Discord
Menu
Log in
Register
Install the app
Install
Community
General Tabletop Discussion
*TTRPGs General
An RPG-suitable method for crippling the Internet
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="EzekielRaiden" data-source="post: 8538190" data-attributes="member: 6790260"><p>Very likely, though I don't know the specific details of the Iraq situation. Much internet infrastructure is a mix of both public and private stuff, due to both its origin (university+military stuff) and the size and complexity of its installation.</p><p></p><p>Generally the ways to fight back are (a) track as many IPs as you can and either find a way in software to block them or as you say physically shut them off, (b) attempt to infiltrate the attacking network to subvert it (this was used a few years ago, a formerly-less-wholesome hacker found the kill switch for a very dangerous piece of malware and triggered it), or (c) attempt to isolate your own network from the problem stuff, e.g. changing identifiers or the like so that legitimate traffic knows where to go but the illegitimate does not (difficult to pull off for large entities; try selling Google on the idea that they should switch to a different domain name!) A is easy (well, relatively) but slow/not guaranteed to solve the problem, especially if the attacker is tenacious and able to adapt. B offers no guarantee of results but is likely to be extremely effective when it works. C, as noted, is not really effective for large services and basically just works to keep the "small" stuff alive.</p><p></p><p>If the attacker is an actual corporate entity, they definitely have some potential to cause a lot of damage. Doubly so if they have any intersection with information security, software products, or hardware/maintenance. It's kind of amazing the damage a planned attack can do if the attackers can subvert even a small amount of normal precautions.</p><p></p><p>There's a video from Tom Scott I think you'd appreciate talking about a hypothetical situation where a high-level Google administrator literally turns off ALL security checks for Google accounts--you could enter any password you liked and it would log you in. It's a pretty interesting scenario and at least tangentially related to what you're looking into. Afraid I don't have a link (and am on phone so it'd be hard to get one).</p></blockquote><p></p>
[QUOTE="EzekielRaiden, post: 8538190, member: 6790260"] Very likely, though I don't know the specific details of the Iraq situation. Much internet infrastructure is a mix of both public and private stuff, due to both its origin (university+military stuff) and the size and complexity of its installation. Generally the ways to fight back are (a) track as many IPs as you can and either find a way in software to block them or as you say physically shut them off, (b) attempt to infiltrate the attacking network to subvert it (this was used a few years ago, a formerly-less-wholesome hacker found the kill switch for a very dangerous piece of malware and triggered it), or (c) attempt to isolate your own network from the problem stuff, e.g. changing identifiers or the like so that legitimate traffic knows where to go but the illegitimate does not (difficult to pull off for large entities; try selling Google on the idea that they should switch to a different domain name!) A is easy (well, relatively) but slow/not guaranteed to solve the problem, especially if the attacker is tenacious and able to adapt. B offers no guarantee of results but is likely to be extremely effective when it works. C, as noted, is not really effective for large services and basically just works to keep the "small" stuff alive. If the attacker is an actual corporate entity, they definitely have some potential to cause a lot of damage. Doubly so if they have any intersection with information security, software products, or hardware/maintenance. It's kind of amazing the damage a planned attack can do if the attackers can subvert even a small amount of normal precautions. There's a video from Tom Scott I think you'd appreciate talking about a hypothetical situation where a high-level Google administrator literally turns off ALL security checks for Google accounts--you could enter any password you liked and it would log you in. It's a pretty interesting scenario and at least tangentially related to what you're looking into. Afraid I don't have a link (and am on phone so it'd be hard to get one). [/QUOTE]
Insert quotes…
Verification
Post reply
Community
General Tabletop Discussion
*TTRPGs General
An RPG-suitable method for crippling the Internet
Top