SUBSCRIBE TO OUR FREE NEWSLETTER
Daily news & progressive opinion—funded by the people, not the corporations—delivered straight to your inbox.
5
#000000
#FFFFFF
To donate by check, phone, or other method, see our More Ways to Give page.
Daily news & progressive opinion—funded by the people, not the corporations—delivered straight to your inbox.
UPDATE: Wikileaks reported Monday evening that it was back online after a week-long DDoS attack.
* * *
Whistleblowing organization Wikileaks says it continues to suffer a distributed denial-of-service (DDoS) attack.
The organization first reported the attack, which has expanded to include affiliated sites, on Aug. 3. The groups says 10 gigabits of bogus traffic per second are flooding its site.
On Friday, Wikileaks gave this update on the attacks:
Today, through a series of tweets, WikiLeaks explained in detail the attack they are facing:
More information on the ongoing DDoS attack against WikiLeaks related sites and donation infrastructure follows:
- The attack is well over 10Gbits/second sustained on the main WikiLeaks domains.
- The bandwidth is used is so huge it is impossible to filter without specialized hardware, however...
- the DDoS is not simple bulk UDP or ICMP packet flooding, so most hardware filters won't work either.
- The rage of IPs used is huge. Whoever is running it controls thousands of machines or is able to simulate them.
- We have even tried moving behind https://Cloudflare.com but Cloudflare has re-emptively banned WikiLeaks. Living in the wild wild west.
RT notes that the "attack coincided with WikiLeaks' release of a new portion of emails allegedly acquired by the hacktivist group Anonymous from the server of consulting firm Stratfor. The batch concerns the supposed existence of a US-based system called TrapWire, which allegedly collects images from surveillance cameras across America and uses them to track people for possible threats."
Common Dreams is powered by optimists who believe in the power of informed and engaged citizens to ignite and enact change to make the world a better place. We're hundreds of thousands strong, but every single supporter makes the difference. Your contribution supports this bold media model—free, independent, and dedicated to reporting the facts every day. Stand with us in the fight for economic equality, social justice, human rights, and a more sustainable future. As a people-powered nonprofit news outlet, we cover the issues the corporate media never will. |
UPDATE: Wikileaks reported Monday evening that it was back online after a week-long DDoS attack.
* * *
Whistleblowing organization Wikileaks says it continues to suffer a distributed denial-of-service (DDoS) attack.
The organization first reported the attack, which has expanded to include affiliated sites, on Aug. 3. The groups says 10 gigabits of bogus traffic per second are flooding its site.
On Friday, Wikileaks gave this update on the attacks:
Today, through a series of tweets, WikiLeaks explained in detail the attack they are facing:
More information on the ongoing DDoS attack against WikiLeaks related sites and donation infrastructure follows:
- The attack is well over 10Gbits/second sustained on the main WikiLeaks domains.
- The bandwidth is used is so huge it is impossible to filter without specialized hardware, however...
- the DDoS is not simple bulk UDP or ICMP packet flooding, so most hardware filters won't work either.
- The rage of IPs used is huge. Whoever is running it controls thousands of machines or is able to simulate them.
- We have even tried moving behind https://Cloudflare.com but Cloudflare has re-emptively banned WikiLeaks. Living in the wild wild west.
RT notes that the "attack coincided with WikiLeaks' release of a new portion of emails allegedly acquired by the hacktivist group Anonymous from the server of consulting firm Stratfor. The batch concerns the supposed existence of a US-based system called TrapWire, which allegedly collects images from surveillance cameras across America and uses them to track people for possible threats."
UPDATE: Wikileaks reported Monday evening that it was back online after a week-long DDoS attack.
* * *
Whistleblowing organization Wikileaks says it continues to suffer a distributed denial-of-service (DDoS) attack.
The organization first reported the attack, which has expanded to include affiliated sites, on Aug. 3. The groups says 10 gigabits of bogus traffic per second are flooding its site.
On Friday, Wikileaks gave this update on the attacks:
Today, through a series of tweets, WikiLeaks explained in detail the attack they are facing:
More information on the ongoing DDoS attack against WikiLeaks related sites and donation infrastructure follows:
- The attack is well over 10Gbits/second sustained on the main WikiLeaks domains.
- The bandwidth is used is so huge it is impossible to filter without specialized hardware, however...
- the DDoS is not simple bulk UDP or ICMP packet flooding, so most hardware filters won't work either.
- The rage of IPs used is huge. Whoever is running it controls thousands of machines or is able to simulate them.
- We have even tried moving behind https://Cloudflare.com but Cloudflare has re-emptively banned WikiLeaks. Living in the wild wild west.
RT notes that the "attack coincided with WikiLeaks' release of a new portion of emails allegedly acquired by the hacktivist group Anonymous from the server of consulting firm Stratfor. The batch concerns the supposed existence of a US-based system called TrapWire, which allegedly collects images from surveillance cameras across America and uses them to track people for possible threats."