In-depth丨"Filecoin Water Margin" - Beating Coach Hong with a Stick, Who is Doing the DDOS Attack?

In-depth丨"Filecoin Water Margin" - Beating Coach Hong with a Stick, Who is Doing the DDOS Attack?

Today is the second day of the Filecoin big miner test. There shouldn’t be any big news, but something big happened today.

It is easy to avoid an open attack but difficult to guard against an arrow from behind. I had always thought that the malicious network attack would come in a few days. After all, the network was not stable in the past few days, and the competition had just begun. I thought that the heroes would maintain their dignity. Logically speaking, the stumbling blocks in the competition usually occur in the second half. I didn’t expect that the DDos network attack would come the next day. The hidden attack came too suddenly, which shocked the entire Filecoin community. Let me tell you what happened.

As the old saying goes, the first bird to stick its head out gets shot, and the pain comes in the ass! On the second day of the Filecoin space race, the nodes of the major mining companies that just emerged suffered an unprecedented DDos attack in the history of blockchain mining.

What is a DDOS attack: A DDOS attack refers to a distributed denial of service attack. A distributed denial of service attack can attack many computers at the same time, making the target of the attack unable to function normally. The attack will cause the website and server to become inoperable, which will not only affect the normal use of users, but also cause huge economic losses.

As the first node T01155 with a capacity exceeding 1TB, the Sino-Korean cooperation node DataLine & Diancun Technology highlighted the benefits of friendly cooperation between Chinese and foreign technologies at a time when the international situation is tense. The two companies, who should have opened champagne to celebrate, were busy defending against fierce DDOS attacks. The technical departments of various companies started preparing for space tests in the early morning, but they didn't expect that just when they were about to breathe a sigh of relief, a DDOS attack and defense battle began, leaving the programmers with dark circles under their eyes who had not slept all night with another strand of sad hair on their hands.

After a day of hard work by the relevant technical departments , the T01155 node storage was abnormal, windowPost submission failed, and all storage was lost.

In the end, T01155 was overwhelmed and unable to recover, so it gave up resistance and its remaining strength was reduced to zero.

It is not just T01155, almost all the top ten mining nodes have suffered DDOS attacks to varying degrees . For this reason, CDSI Alliance, the owner of T02398 node, issued a solemn statement for the attacker, saying that if necessary, the attacker will be announced and handed over to the public security organs for processing . I wonder if the attacker who saw this news was scared?

Beijing police have previously launched special crackdowns on cyberattacks, but the laws and regulations for the digital currency mining industry itself are relatively vague. I don’t know if the case will be filed according to the normal processing procedures if it is reported this time. If it is filed, it will be the first case in the history of blockchain to file a case against DDOS attacks in mining, which is a milestone. In any case, the Filecoin project has indeed created many “firsts” in blockchain.

For attackers, carrying out DDOS attacks requires a lot of server resources, which is very expensive. Even if the server is rented, it still costs money. But what are the benefits of attacking nodes for attackers? We guess here that if you want to have your own node on the leaderboard, there are only two ways to do it. 1. Make yourself run fast. 2. Make others run slowly.

In order to prevent the computing power of miners' nodes from growing so that their own nodes can catch up for corporate publicity, some companies or individuals launch DDOS attacks that seem more reasonable.

"Song Jiang": If I say it wasn't me, would anyone believe it?

However, if the winner through DDOS is finally caught, the situation will become very ugly. The restart of the large miner test is a low-probability event, but if this manufacturer is caught competing in this way, it will not be able to establish credibility in the market, which means that its reputation will be completely ruined.

The top vendors are facing the following situations:

First, they also use DDOS to deal with other manufacturers. This is advantageous in terms of competitive strategy, but the front-line manufacturers are careful about their reputation, so the input-output ratio is problematic and the reputation risk is too high.

Second, they adopted non-violent and non-cooperative means, and just blindly relied on their technical strength to run wildly. I don’t know about this. After all, Diancun Technology was already blindly running wildly when it was about to reach the finish line (first place), and was directly dragged down.

This is a dilemma, a dilemma that is very unfriendly to the top-ranked manufacturers.

There are still speculations about who "Song Jiang" is. I don't think it was Song Jiang who launched the DDOS, so I'll clear his name. The reason is that the questions he asked are indeed the ones that everyone is concerned about, but he asked them as a representative of the miners. If he wanted to launch a DDOS attack, he wouldn't have to go to such trouble to help ask questions and discuss. "When it's time to take action, take action."

Of course, if Mr./Ms. Song Jiang could take the initiative to identify the manufacturer that carried out the DDOS and publish the evidence, it would really be a timely relief.


<<:  Two more companies hold Bitcoin as reserve assets

>>:  The DeFi asset management track is gaining popularity. What are the potential and constraints of the improved Melon?

Recommend

Is a man with s-shaped eyebrows and small eyes lucky?

In terms of fortune, a person's face can actu...

Analyze a man's life destiny through his face

Physiognomy is a profound and extensive subject. ...

Will a woman with a mole on her waist become richer?

Because moles can grow anywhere on a person's...

Facial features that are easily broken up by mistresses

Facial features that are easily broken up by mist...

The competition between Ethereum and Bitcoin from an evolutionary perspective

Chapter 0 Introduction How to design a product th...

Good-hearted facial features

In physiognomy, different facial features represe...

Wu Menglong palmistry: finger length determines your job-hopping luck

According to statistics, 80% of workers plan to c...

Low nose bridge and bulbous nose

From the perspective of physiognomy, is this low ...

The characteristics of a woman who is unfaithful can be seen from her face

If a woman is unfaithful, then this kind of woman...

Talking about the art of Bitcoin, from Lang Xianping to Jack Ma

A video of "National Dad" Jack Ma menti...

Palmistry to see the depth of your fate with your children

Children are the continuation of bloodline, the s...