64 entries in 0.807s
feedbot: http://qntra.net/2019/11/us-court-hits-ddos-for-hire-operator-with-mere-13-months-of-incarceration/ << Qntra -- US Court Hits DDoS For Hire Operator With Mere 13 Months Of Incarceration
BingoBoingo: <asciilifeform> BingoBoingo: mno. during ddos, whole pipe was dead. whereas atm e.g. uy1 loads, ditto ossasepia, but not dulap or qntra << Ah, here I was trying to load qntra
asciilifeform: BingoBoingo: mno. during ddos, whole pipe was dead. whereas atm e.g. uy1 loads, ditto ossasepia, but not dulap or qntra
BingoBoingo: The .247 address will be getting unblackholed at some point. In the interim I have put skeleton DNS entries for sites not previously using our DNS server in place. Using ns1.qntra.net and ns2.qntra.net will allow restoring public access to sites more quickly in the event a DDoS is mitigated.
BingoBoingo: Alright, sites using ns1 and ns2.qntra.net for their names are online. Others using shared hosting are welcome to point their domains at I will put entries for all of the sites on pizarro shared hosting into the name server. This way in the future when we have an IP get DDoS mitigated, recovery will not be so time consuming.
BingoBoingo: Look who's back http://qntra.net/2018/03/memcached-ddos-attacks-lead-to-record-breaking-levels-of-wank/#comment-111193
deedbot: http://qntra.net/2018/03/memcached-ddos-attacks-lead-to-record-breaking-levels-of-wank/ << Qntra - Memcached DDoS Attacks Lead To Record Breaking Levels Of Wank
deedbot: http://qntra.net/2017/06/ethereum-blocks-way-the-fuck-too-big-smart-contract-ddosing-own-initial-coin-offering-to-blame/ << Qntra - Ethereum Blocks Way The Fuck Too Big: "Smart" Contract DDoS'ing Own "Initial Coin Offering" To Blame
Framedragger: mircea_popescu: qntra being ddos'd recently?
deedbot: http://qntra.net/2016/10/hack-forum-kicks-ddos-vendors/ << Qntra - Hack Forum Kicks DDoS Vendors
mircea_popescu: http://log.mkj.lt/trilema/20160906/from:62/to:62#62 << the same thing is in principle true of cryptography generally (funny how it just keeps coming back to this again and again) : "no matter how long you make your key, it can be factored by adding more computers". this is true ; but it's up to you to make it irrelevant. the reason whenever someone does manage to ddos trilema / qntra / etc i tend to just wait is because time
BingoBoingo: https://archive.is/sxJUF << In case of DDoS the why QNtra piece
BingoBoingo: Aw, qntra appears DDoS'd now just when I am considering a piece on the increase in young Muricans with ischemic brain damage
asciilifeform: lel qntra ddos ?
BingoBoingo wonders what it means when phuctor is DDoS on a day qntra barely recieved any comment spamzors
pete_dushenski: http://log.bitcoin-assets.com/?date=17-02-2016#1408301 << brush off one ddos and 'to the moon' ? did i miss a meta-qntra memo here or what ☝︎
asciilifeform: not precisely. re: qntra, i specifically think that the 'they don't exist, don't look there, nothing to see' field generator is operating so well, that they no longer see any need to draw attention with ddos.
mircea_popescu: you DID say the exact this re qntra and ddos yest.
asciilifeform: e.g., expect massive qntra ddos some time in the next few hrs
thestringpuller: BingoBoingo: because qntra has giant "DDOS me" sign on it's back as it walks to halls?
deedbot-: [Qntra] CoinBase Blames DDoS For Irregular Exchange Behavior - http://qntra.net/2016/01/coinbase-blames-ddos-for-irregular-exchange-behavior/
BingoBoingo: K, qntra's slow seems to have a touch of the DDoS. Going to sleep. Anyone who wants to write about Intel's Skylake already having a rowhammer exploit coded for its DDR4 controler feel free to sumbit a piece.
asciilifeform: the ddos of trilema ? qntra ?
BingoBoingo: re qntra DDoS http://bbencourgr.tumblr.com/post/133298781205/diabetes-gaining
BingoBoingo: Also lol considering qntra DDoS https://www.reddit.com/r/netsec/comments/3l3tt5/cryptome_pgp_keys_compromised_revoked/
BingoBoingo: <mircea_popescu> and you can convince me it's a natural process by showing me naturally occuring steel lattice girders and meteors in the shape of chicken wire. << And now that we are making fun of Lopp'd off his penis qntra is being DDoS
mircea_popescu: jurov consider the experimentally verified, and publicly at that, fact that ddos couldn't do any appreciabvle harm to qntra, or trilema.
assbot: XT Node Blacklists Fail to Prevent DDoS Attack | Qntra ... ( http://bit.ly/1N7O0oW )
BingoBoingo: ascii_field mircea_popescu: http://qntra.net/2015/09/xt-node-blacklists-fail-to-prevent-ddos-attack/#comment-51115
assbot: XT Node Blacklists Fail to Prevent DDoS Attack | Qntra ... ( http://bit.ly/1JH0sKb )
asciilifeform: mircea_popescu et al: http://qntra.net/2015/09/xt-node-blacklists-fail-to-prevent-ddos-attack/#comment-51035
deedbot-: [Qntra] XT Node Blacklists Fail to Prevent DDoS Attack - http://qntra.net/2015/09/xt-node-blacklists-fail-to-prevent-ddos-attack/
BingoBoingo: Oh, so much qntra DDoS
BingoBoingo: ascii_field: Only so many nuggets I can do when qntra under DDoS
BingoBoingo: Oh, the many ways and times qntra suffers the slings and arrows of DDoS. People just can't stop endorsing us this way
BingoBoingo: And qntra gets DDoS resurgent when update post button is hit
kakobrekla: as far as i can tell the attacker of qntra (trilema?) is the same as it was of bitbet last ddos.
assbot: Logged on 22-07-2015 00:00:52; BingoBoingo: http://qntra.net/2015/07/alm-ceo-cries-terrorism-after-ashley-madison-hack/ and DDos This https://archive.is/i7XvH << hanbot
BingoBoingo: http://qntra.net/2015/07/alm-ceo-cries-terrorism-after-ashley-madison-hack/ and DDos This https://archive.is/i7XvH << hanbot ☟︎
scoopbot_revived: Continued DDoS Attack Against Qntra http://qntra.net/2015/07/continued-ddos-attack-against-qntra/
cazalla: mircea_popescu, is this ddos on qntra or something else?
cazalla: isn't this just a case of someone (likely guy who ddos joiners here) sending out spam from another server but spoofing return address so qntra email gets hammered with delivery fail spam?
assbot: Logged on 02-06-2015 07:15:59; cazalla: qntra down for anyone else? ddos back eh?
cazalla: qntra down for anyone else? ddos back eh? ☟︎
BingoBoingo: Qntra was born in a multi gbp/s DDoS
mircea_popescu: like the qntra ddos stuff was informative re wp etc
assbot: Logged on 12-03-2015 05:15:44; asciilifeform: qntra ddos ?
asciilifeform: qntra ddos ? ☟︎
asciilifeform: naturally mr ddos will have nothing to do but move on to qntra, trilema, bitbet...
asciilifeform: let's rephrase a little. the internet as presently exists, is, in practice, mainly a machine for 1) connecting derps to 'reddit' and 'arsebook' 2) routing ddos packets to trilema, qntra...
kakobrekla: <fivezerotwo> now I am going to ddos targets I actually give a fuck about. but don't worry, you can have you fun with bitbet afterwards with the same qntra/trilema-down flood
punkman: qntra too hard to ddos now, moving on to easier targets?
BingoBoingo: http://qntra.net/2014/11/us-department-of-justice-kim-dotcom-cant-challenge-asset-forfeiture/#comment-1875 << Apparently traffic is not all DDoS and this chan
cazalla: hate to say it but.. qntra? ddos?
cazalla: qntra under ddos?
mircea_popescu: <asciilifeform> instant anti-ddos pill << this is like saying that because anyone can wget -m qntra.net that's an anti ddos pill
mircea_popescu: so anyway, the ddos of qntra is dead. here are the captions : 12`754`766 requests from 5397 unique wordpress installations.
jurov: well, that's my proposal for qntra article: "Qntra was under DDoS sustained for 3 days. Ther was no newsworthy scam activity in bicoinland during this time."
thestringpuller: qntra still DDOS?
cazalla: mircea_popescu, ddos back? i see static page on qntra again
mike_c: those guys must be really bored. get mp kicked off twitter! ddos qntra!
mircea_popescu: http://trilema.com/wp-content/uploads/2014/10/qntra-ddos-2.png <<< how's 40mbps sound ?
mircea_popescu: <BingoBoingo> devthedev: Maybe write about how Mullenwang sucks a big bag of dicks? <<< btw, you want data to write a qntra ddos piece or not really ?
mircea_popescu: http://trilema.com/wp-content/uploads/2014/10/qntra-ddos.png << graphs, if anyone's curious.