this post was submitted on 01 Oct 2025
86 points (98.9% liked)
Asklemmy
50754 readers
502 users here now
A loosely moderated place to ask open-ended questions
Search asklemmy ๐
If your post meets the following criteria, it's welcome here!
- Open-ended question
- Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
- Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
- Not ad nauseam inducing: please make sure it is a question that would be new to most members
- An actual topic of discussion
Looking for support?
Looking for a community?
- Lemmyverse: community search
- sub.rehab: maps old subreddits to fediverse options, marks official as such
- !lemmy411@lemmy.ca: a community for finding communities
~Icon~ ~by~ ~@Double_A@discuss.tchncs.de~
founded 6 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
a BGP highjack of one of the root DNS servers (I have the letter L in my head for some reason).
The story was that whoever took it kept responding the same as the real one and noone noticed for days. How anyone could get away with this is beyond me & it stinks of conspiracy theory but there was a very convincing looking article about it somewhere.
I was just listening recently to a podcast that brought up a BGP highjack.
Some people involved with the Pirate Bay got into the BGP router for North Korea and made it look like they were hosted there for a while. Maybe you're thinking of that?
Relevant clip from the episode as a youtube short. Full episode on Youtube. Episode page on the Darknet Diaries site, with download link, cited sources, and full transcript.
It looks like perhaps it was a myth.
According to root-servers.org:
Bummer.
Edit: This article describes an attack this year. I was thinking of an older one.