DDoSCoin: Kryptowährung für Server-Angriffe

Gepostet vor 1 Monat, 12 Tagen in Science Tech Share: Twitter Facebook Mail

DDoSCoin, ein Bitcoin-Klon, in dem die Rechenleistung während des Minings für DDoS-Angriffe verwendet und als Gegenleistung für die Angriffe und/oder Adressen potentieller Opfer in Bitcoins ausgezahlt wird: Meet DDoSCoin, the cryptocurrency that pays when you p0wn. Wie gemein. 😈

ddosUniversity of Colorado assistant professor Eric Wustrow and University of Michigan phD student Benjamin VanderSloot create the platform that allows TLS web servers to be targeted. Signatures are created when TLS connections are confirmed, gifting attackers another means to be paid for denial of service attacks.

The DDoSCoins could be traded in for cryptocurrencies like Bitcoin and Ethereum, the pair say. "DDoSCoin allows miners to prove that they have contributed to a distributed denial of service attack against specific target servers," the researchers write in the paper DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work.

Hier das Paper: DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work.

we have presented a proof-of-DDoS cryptocurrency that allows miners to prove their involvement in sending a large amount of requests to a specified victim webserver. Proof-of-DDoS can be used to replace proofof-work in a cryptocurrency setting, provided that there is consensus around what victims are valid targets. Our conceptual altcoin, DDoSCoin, provides such a consensus through two mechanisms: PAY_TO_DDOS, whereby a bounty can be set for DDoSing a given victim domain, and proof-of-stake updates to the list of valid victims.

Cryptocurrency innovation continues to produce new and useful proof-of-work replacements. Still, proving access to arbitrary resources remains a difficult challenge. In this direction, DDoSCoin delivers a novel technique for proving the use of bandwidth to a (potentially unwilling) target domain. We hope that this work encourages others to discover and innovate on novel proof-of-resource puzzles.

Tags: Bitcoins Coding Hacks Security



Clever, hat zwei Sekunden gedauert oder zehn. (via Ronny) [update] Auch schön:

Binary Bandit steals 0s and 1s

Binary Bandit steals 0s and 1s

01010100 01101000 01100101 01101110 00100000 01110100 01101000 01101001 01110011 00100000 01101000 01100001 01110000 01110000 01100101 01101110 01100101 01100100 00111010 (via…


Audio from Typo-Outlines

Gestern auf der Konferenz der Association Typographique Internationale in der Academy of Fine Arts in Warsaw: Type-Designer Just van Rossum…


Signal Jammer Tanks

Von Julian Oliver (dem Herrn mit der Transparency Grenade) auf Twitter: „My 3 jammer tanks 'No Network' (GSM), 'No Internet'…


They can ID by the Pixels

Vor einem Monat bloggte ich über ein Paper, in dem sie ein Verfahren vorstellten, um Verpixelungen von Schriftzeichen zu umgehen…



Über David Peters Cube-Composer hatte ich schonmal vor einem Jahr gebloggt, seitdem hat er das Teil bisschen aufgehübscht, den Code…


Website inside robots.txt

Netter Hack von Alec Bertram, eine Website in robots.txt: What's going on here: When parsing robots.txt files, search engines ignore…


Excellent Dwarf Fortress-Bug

Some Bugs are better than others. Aus einem Interview mit Dwarf Fortress-Macher Tarn Adams. (via @neoascetic) It’s funny how I…


AI macht Cheeseburger

And this, Kids, is how an AI makes a Burger. It throws Noise together until it matches the pattern, just…

Bildschirmfoto 2016-08-29 um 12.30.35

IPs encoded as Haikus

Was für eine einfache, tolle und wunderbare Idee von Gabriel Martin: Hipku – encode any IP address as a haiku,…


Potaka: Erste Programmiersprache in bengalischer Schrift

Vor dreieinhalb Jahren gab's die erste Programmiersprache in arabischer Schrift, nun hat Ikrum Hossain eine erste Programmiersprache in bengalischen Zeichen…