SUBSCRIBE TO OUR FREE NEWSLETTER
Daily news & progressive opinion—funded by the people, not the corporations—delivered straight to your inbox.
5
#000000
#FFFFFF
To donate by check, phone, or other method, see our More Ways to Give page.
Daily news & progressive opinion—funded by the people, not the corporations—delivered straight to your inbox.
UPDATE: Wikileaks reported Monday evening that it was back online after a week-long DDoS attack.
* * *
Whistleblowing organization Wikileaks says it continues to suffer a distributed denial-of-service (DDoS) attack.
The organization first reported the attack, which has expanded to include affiliated sites, on Aug. 3. The groups says 10 gigabits of bogus traffic per second are flooding its site.
On Friday, Wikileaks gave this update on the attacks:
Today, through a series of tweets, WikiLeaks explained in detail the attack they are facing:
More information on the ongoing DDoS attack against WikiLeaks related sites and donation infrastructure follows:
- The attack is well over 10Gbits/second sustained on the main WikiLeaks domains.
- The bandwidth is used is so huge it is impossible to filter without specialized hardware, however...
- the DDoS is not simple bulk UDP or ICMP packet flooding, so most hardware filters won't work either.
- The rage of IPs used is huge. Whoever is running it controls thousands of machines or is able to simulate them.
- We have even tried moving behind https://Cloudflare.com but Cloudflare has re-emptively banned WikiLeaks. Living in the wild wild west.
RT notes that the "attack coincided with WikiLeaks' release of a new portion of emails allegedly acquired by the hacktivist group Anonymous from the server of consulting firm Stratfor. The batch concerns the supposed existence of a US-based system called TrapWire, which allegedly collects images from surveillance cameras across America and uses them to track people for possible threats."
Dear Common Dreams reader, The U.S. is on a fast track to authoritarianism like nothing I've ever seen. Meanwhile, corporate news outlets are utterly capitulating to Trump, twisting their coverage to avoid drawing his ire while lining up to stuff cash in his pockets. That's why I believe that Common Dreams is doing the best and most consequential reporting that we've ever done. Our small but mighty team is a progressive reporting powerhouse, covering the news every day that the corporate media never will. Our mission has always been simple: To inform. To inspire. And to ignite change for the common good. Now here's the key piece that I want all our readers to understand: None of this would be possible without your financial support. That's not just some fundraising cliche. It's the absolute and literal truth. We don't accept corporate advertising and never will. We don't have a paywall because we don't think people should be blocked from critical news based on their ability to pay. Everything we do is funded by the donations of readers like you. Will you donate now to help power the nonprofit, independent reporting of Common Dreams? Thank you for being a vital member of our community. Together, we can keep independent journalism alive when it’s needed most. - Craig Brown, Co-founder |
UPDATE: Wikileaks reported Monday evening that it was back online after a week-long DDoS attack.
* * *
Whistleblowing organization Wikileaks says it continues to suffer a distributed denial-of-service (DDoS) attack.
The organization first reported the attack, which has expanded to include affiliated sites, on Aug. 3. The groups says 10 gigabits of bogus traffic per second are flooding its site.
On Friday, Wikileaks gave this update on the attacks:
Today, through a series of tweets, WikiLeaks explained in detail the attack they are facing:
More information on the ongoing DDoS attack against WikiLeaks related sites and donation infrastructure follows:
- The attack is well over 10Gbits/second sustained on the main WikiLeaks domains.
- The bandwidth is used is so huge it is impossible to filter without specialized hardware, however...
- the DDoS is not simple bulk UDP or ICMP packet flooding, so most hardware filters won't work either.
- The rage of IPs used is huge. Whoever is running it controls thousands of machines or is able to simulate them.
- We have even tried moving behind https://Cloudflare.com but Cloudflare has re-emptively banned WikiLeaks. Living in the wild wild west.
RT notes that the "attack coincided with WikiLeaks' release of a new portion of emails allegedly acquired by the hacktivist group Anonymous from the server of consulting firm Stratfor. The batch concerns the supposed existence of a US-based system called TrapWire, which allegedly collects images from surveillance cameras across America and uses them to track people for possible threats."
UPDATE: Wikileaks reported Monday evening that it was back online after a week-long DDoS attack.
* * *
Whistleblowing organization Wikileaks says it continues to suffer a distributed denial-of-service (DDoS) attack.
The organization first reported the attack, which has expanded to include affiliated sites, on Aug. 3. The groups says 10 gigabits of bogus traffic per second are flooding its site.
On Friday, Wikileaks gave this update on the attacks:
Today, through a series of tweets, WikiLeaks explained in detail the attack they are facing:
More information on the ongoing DDoS attack against WikiLeaks related sites and donation infrastructure follows:
- The attack is well over 10Gbits/second sustained on the main WikiLeaks domains.
- The bandwidth is used is so huge it is impossible to filter without specialized hardware, however...
- the DDoS is not simple bulk UDP or ICMP packet flooding, so most hardware filters won't work either.
- The rage of IPs used is huge. Whoever is running it controls thousands of machines or is able to simulate them.
- We have even tried moving behind https://Cloudflare.com but Cloudflare has re-emptively banned WikiLeaks. Living in the wild wild west.
RT notes that the "attack coincided with WikiLeaks' release of a new portion of emails allegedly acquired by the hacktivist group Anonymous from the server of consulting firm Stratfor. The batch concerns the supposed existence of a US-based system called TrapWire, which allegedly collects images from surveillance cameras across America and uses them to track people for possible threats."