you are viewing a single comment's thread.

view the rest of the comments →

[–]magnora7[S] 10 insightful - 3 fun10 insightful - 2 fun11 insightful - 3 fun -  (4 children)

Dude, you got to find some way to harness the energy of DDOS attacks

Haha that's a great idea. I love it.

What if we got all the DDOS attacker connections to do cryptocurrency mining for us and kept the money to pay for servers for saidit?! haha

Plus we do actually get a bump in traffic from these DDOS attacks. Because from an external perspective, in all the ratings and stuff, it just causes our traffic to appear to have gone way up, so it increases our google rank and so on.

[–][deleted] 5 insightful - 3 fun5 insightful - 2 fun6 insightful - 3 fun -  (3 children)

What if we got all the DDOS attacker connections to do cryptocurrency mining for us and kept the money to pay for servers for saidit?!

DUDE!!! You're a freaking genius!!!

OK, how would that work? Each connection to saidit is used to create a little bit of the chain, just a little so it's barely noticeable in the performance, but enough that when DDOS is going on if just keeps on pouring the $$$$ ? You know, laughing all the way to the bank?

[–][deleted] 4 insightful - 1 fun4 insightful - 0 fun5 insightful - 1 fun -  (0 children)

As a cryptography expert it doesn't really work like that.

Unless you find a way for the attacks to compute specific puzzles, then it's impossible.

[–]magnora7[S] 4 insightful - 1 fun4 insightful - 0 fun5 insightful - 1 fun -  (1 child)

I'm not sure if it's possible. But if someone hacked over a million webcams to mine for bitcoins without the owners knowing, then it seems like someone could create a webpage that connects to a mining pool and starts mining in the background.

But another problem is a lot of the connections are initiated and then immediately dropped, so even if we could trick all that DDOS traffic to go to a mining webpage, they probably still wouldn't stay long enough to do any appreciable work.

[–][deleted] 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

The one thing I found was CoinHive, here's an article not very specific about it: https://www.theregister.com/2017/10/19/malwarebytes_blocking_coin_hive_browser_cryptocurrency_miner_after_user_revolt/

Don't think it would work on DDOS, but who knows, maybe some genius will come with some ways to generate block chain based on connection requests of a DDOS.