ek on Nostr: From your link: "LOIC attacks are easily identified in system logs, and the attack ...
From your link:
"LOIC attacks are easily identified in system logs, and the attack can be tracked down to the IP addresses used."
So I don't consider this to be effective DDoS. I consider Cloudflare to be a more authoritative source on this matter.
Also, where is the source that activists used this? Were they successful using LOIC?
"LOIC attacks are easily identified in system logs, and the attack can be tracked down to the IP addresses used."
So I don't consider this to be effective DDoS. I consider Cloudflare to be a more authoritative source on this matter.
Also, where is the source that activists used this? Were they successful using LOIC?