DDoSCoin: Kryptowährung für Server-Angriffe

Gepostet vor 9 Monaten, 10 Tagen in #Science #Tech #Bitcoins #Coding #Hacks #Security

Share: Twitter Facebook Mail

DDoSCoin, ein Bitcoin-Klon, in dem die Rechenleistung während des Minings für DDoS-Angriffe verwendet und als Gegenleistung für die Angriffe und/oder Adressen potentieller Opfer in Bitcoins ausgezahlt wird: Meet DDoSCoin, the cryptocurrency that pays when you p0wn. Wie gemein. 😈

ddosUniversity of Colorado assistant professor Eric Wustrow and University of Michigan phD student Benjamin VanderSloot create the platform that allows TLS web servers to be targeted. Signatures are created when TLS connections are confirmed, gifting attackers another means to be paid for denial of service attacks.

The DDoSCoins could be traded in for cryptocurrencies like Bitcoin and Ethereum, the pair say. "DDoSCoin allows miners to prove that they have contributed to a distributed denial of service attack against specific target servers," the researchers write in the paper DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work.

Hier das Paper: DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work.

we have presented a proof-of-DDoS cryptocurrency that allows miners to prove their involvement in sending a large amount of requests to a specified victim webserver. Proof-of-DDoS can be used to replace proofof-work in a cryptocurrency setting, provided that there is consensus around what victims are valid targets. Our conceptual altcoin, DDoSCoin, provides such a consensus through two mechanisms: PAY_TO_DDOS, whereby a bounty can be set for DDoSing a given victim domain, and proof-of-stake updates to the list of valid victims.

Cryptocurrency innovation continues to produce new and useful proof-of-work replacements. Still, proving access to arbitrary resources remains a difficult challenge. In this direction, DDoSCoin delivers a novel technique for proving the use of bandwidth to a (potentially unwilling) target domain. We hope that this work encourages others to discover and innovate on novel proof-of-resource puzzles.

Useful Tool to monitor the AltRight: Youtube Auto Transcripts

I'm writing this in English because I think this may be relevant, I haven't seen this Idea anywhere and I…

C64-Demo generates itself from Soundtrack

Gewinnerdemo der Revision 2017 von Linus Akesson, ein C64-Hack in 256 Bytes: A Mind is born. Ich verstehe ja noch…

Binary Keyboard

Nette Spielerei von Chris Johnston: „A two-button backlit mechanical keyboard that types ASCII values, one bit at a time.“ (via…

Trolling an Ad that hacks Google Home with Burgers made from 100% Rat and Toenail Clippings

Burger King hat vor ein paar Stunden das Commercial oben online gestellt, das Google Home per Sprachsteuerung aktiviert („OK Google“)…

Digital-Uhr in Conways Game of Life

Großartig: Eine Digital-Uhr in John Horton Conways zweidimensionalen zellulären Automaten: Get the design from this gist. Copy the whole file…

A Banana Keytar and more from Stupid Hackathon: Inverted Eyetracker-Pong, Robot Porn Addict or the Shitty Sharpie Tattoo Gun)

Ein weiterer Fav vom Stupid Hackathon NYC 2017, die Banana-Keytar von Amanda Lange. Auch geil: der Twitter-Bot Robot Porn Addiction,…

Dwitter – Social-Network für JavaScript-Remixe

Dwitter, ein Social Network von Andreas Løve Selvik für visuelle Javascript-Experimente in 140 Zeichen mit eingebauter Remix-Option für jedes Code-Snippet.…

Finding Animal-Shapes in Noise

Michael Trott hat im Forum von Wolfram Alpha ein random Noise-Pic generiert, die Verdichtungen und Shapes im Noise isoliert, die…

The best Anagramm

Mark Dominus hat das beste Anagramm der englischen Sprache ausgerechnet. Dazu hat er die komplette Liste der Anagramme (der englischen…

./code--poetry

„This website displays a collection of twelve code poems, each written in the source code of a different programming language.…

Stupid Hacks from Stupid Hackathon Sweden

Vor ein paar Tagen ging der Stupid Hackathon Schweden zu Ende, hier eine Liste aller dort realisierten Projekte. Spontan mein…