![]() The other clauses about bigotry are pretty much aligned with GitHub's ToS, which has "GitHub does not tolerate speech that attacks or promotes hate toward an individual or group of people on the basis of who they are, including age, body size, ability, ethnicity, gender identity and expression, level of experience, nationality, personal appearance, race, religion, sexual identity, or sexual orientation", and "We have the right to refuse or remove any User-Generated Content that, in our sole discretion, violates any laws or GitHub terms or policies." Yes, he doesn't like cryptocurrency projects. But they also have a reputation for being awful. It's just less likely to go unnoticed.Ĭogent is a massive provider, so you'd think they'd be a bit better at this. If those upstreams stop forwarding traffic to them, the same thing would happen. Though major cloud providers tend to have their own connectivity between their datacenters, they too have peering/transit agreements with other major network providers. Google or AWS or Microsoft might've handled it more gracefully, or might not. In general, Cogent seems to be doing a rather bad job at dealing with this attack and there's been fallout for many services beyond Sourchut. Being hosted on GCP, a major cloud provider, would be of no use, since there wouldn't be a network path to them in the first place. Imagine if your ISP decided to stop routing traffic to Google. What happened here is that due to some administrative lapses, the victims (Sourcehut) of the attack got disabled by the network provider. Typically what you want to do though is stop the traffic from reaching you at all, so ideally your network provider, who is upstream from you, blocks the illegitimate traffic so your servers never see it and don't get overwhelmed. > We spoke to CloudFlare and were quoted a number we cannot reasonably achieve within our financial means Major cloud providers tend to have that, as do DDoS mitigation services (Cloudflare amongst others). It's also worth remembering that cloud providers are also servers in racks, but they own the building around it to.įor DDoS attacks, you need to have enough capacity to absorb the attack. It's a good overview on the economics of scam calls in India. On top of that, the scamming call centers are closely tied to the ruling party machinery in that state, as you need to get a license from the state government to operate a call center, and these kinds of call centers will often be donating to local political parties to look the other way. This ended up in the Supreme Court for a couple years. West Bengal removed it's consent for Federal Police in India to raid without the consent of West Bengal Police. West Bengal is ruled by a regional opposition party called the TMC. ![]() ![]() The scamming call centers are located in a state called West Bengal. Raids that are not National Security related need coordination between the Federal Government and State Government in India. > Americans like Scammer Payback report giant scam callcenters with credible evidence, they take well over a year to raid it > Indian police is actually able to do quite the lot of pressure when terrorism is involvedīecause terrorism related stuff falls under the Indian equivalent of Homeland Security, even if it's local PD triaging. If it was some local PD asking the platform, they probably wouldn't have the capabilities to DDOS ![]() If it was actually National Security related, it would have went through a couple fusion centers that the Indian government formed. Beat cops definitely aren't, but most police forces in India are state level and a couple are federal, and will usually have a Task Force devoted to offensive and defensive security, and if not, will contract out to companies like Appin Security Group (who were able to force Reuters and SentinelOne to remove their report into how the private-public cyber model in India operated )Īlso, after the 2008 Mumbai Attacks, the Indian Ministry of Home Affairs began working on coordinating and centralizing Metadata Analysis and Monitoring, because they unable to trace the VoIP calls used by LeT. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |