DDoSCoin: Kryptowährung für Server-Angriffe

Gepostet vor 11 Monaten, 15 Tagen in #Science #Tech #Bitcoins #Coding #Hacks #Security

Share: Twitter Facebook Mail

DDoSCoin, ein Bitcoin-Klon, in dem die Rechenleistung während des Minings für DDoS-Angriffe verwendet und als Gegenleistung für die Angriffe und/oder Adressen potentieller Opfer in Bitcoins ausgezahlt wird: Meet DDoSCoin, the cryptocurrency that pays when you p0wn. Wie gemein. 😈

ddosUniversity of Colorado assistant professor Eric Wustrow and University of Michigan phD student Benjamin VanderSloot create the platform that allows TLS web servers to be targeted. Signatures are created when TLS connections are confirmed, gifting attackers another means to be paid for denial of service attacks.

The DDoSCoins could be traded in for cryptocurrencies like Bitcoin and Ethereum, the pair say. "DDoSCoin allows miners to prove that they have contributed to a distributed denial of service attack against specific target servers," the researchers write in the paper DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work.

Hier das Paper: DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work.

we have presented a proof-of-DDoS cryptocurrency that allows miners to prove their involvement in sending a large amount of requests to a specified victim webserver. Proof-of-DDoS can be used to replace proofof-work in a cryptocurrency setting, provided that there is consensus around what victims are valid targets. Our conceptual altcoin, DDoSCoin, provides such a consensus through two mechanisms: PAY_TO_DDOS, whereby a bounty can be set for DDoSing a given victim domain, and proof-of-stake updates to the list of valid victims.

Cryptocurrency innovation continues to produce new and useful proof-of-work replacements. Still, proving access to arbitrary resources remains a difficult challenge. In this direction, DDoSCoin delivers a novel technique for proving the use of bandwidth to a (potentially unwilling) target domain. We hope that this work encourages others to discover and innovate on novel proof-of-resource puzzles.

Monospaced Programming Fonts with Ligatures

Didn't know these exist, love it: Monospaced Programming Fonts with Ligatures. Three of the most interesting and thoughtful monospaced programming…

Stereographic Torus Knot

I'm not sure what's going on here but I like it: „This is very similar to Rise Up, though with…

Transparent Lockpick-Training-Set

Gestern für nen Dreißiger bestellt, weil ich mich schon mehr als einmal ausgesperrt habe und Schlüsseldienst zu teuer is: Lock…

3D-Rendering accepted as ID-Photo

Herr Raphaël Fabre hat ein 3D-Rendering als Passfoto eingereicht und ist damit durchgekommen. An den Haaren hätten sie's eigentlich erkennen…

Very Bad Volume Control Interfaces

Vor einer Woche postete Redditor Jacobone dieses Interface für Lautstärkeregelung von irgendeiner Win-App. Then this happened: r/ProgrammerHumor/search?q=volume&restrict_sr=on. Because ofcourse it…

Reality leaks

The Intercept veröffentlichte gestern neue NSA-Leaks mit Beweisen für Wahl-Hacks der Russen. Direkt nach der Veröffentlichung wurde nun eine Frau…

Zalgo Droplet

A Javascript-Droplet „to invoke the hive-mind representing chaos. Invoking the feeling of chaos. With out order. The Nezperdian hive-mind of…

Useful Tool to monitor the AltRight: Youtube Auto Transcripts

I'm writing this in English because I think this may be relevant, I haven't seen this Idea anywhere and I…

C64-Demo generates itself from Soundtrack

Gewinnerdemo der Revision 2017 von Linus Akesson, ein C64-Hack in 256 Bytes: A Mind is born. Ich verstehe ja noch…

Binary Keyboard

Nette Spielerei von Chris Johnston: „A two-button backlit mechanical keyboard that types ASCII values, one bit at a time.“ (via…

Trolling an Ad that hacks Google Home with Burgers made from 100% Rat and Toenail Clippings

Burger King hat vor ein paar Stunden das Commercial oben online gestellt, das Google Home per Sprachsteuerung aktiviert („OK Google“)…