this post was submitted on 30 May 2024
689 points (99.1% liked)

Technology

59135 readers
2588 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] foggy@lemmy.world 13 points 5 months ago (1 children)

What I wanna know is how companies get away with stuff like this.

Getting to the bottom of a cyber attack isn't... Impossible? It just takes resources.

[–] BestBouclettes@jlai.lu -3 points 5 months ago (1 children)

You just pay random people on the internet to do it, it's fairly easy if you know where/what to ask for.

[–] foggy@lemmy.world 7 points 5 months ago (1 children)
[–] Xanis@lemmy.world 3 points 5 months ago (1 children)

Just about anything is traceable. The trick is making it not worth the effort.

[–] foggy@lemmy.world 1 points 5 months ago (1 children)

Ask eBay how that towing that line worked out for them.

[–] Sethayy@sh.itjust.works 1 points 5 months ago (1 children)

See sending ip packets is quite a lot easier that sending pig fetuses

[–] foggy@lemmy.world 1 points 5 months ago

Yes, but far more traceable!

I mean, if eBay couldt cover entrails...