redmadoker:

tevruden:

redmadoker:

tevruden:

So if you can figure out how to predict an attack that can do more than three hundred four hundred billion bits per second of trafficyou stand to make a lot of money.

What you’re literally they should do is say “Oh maybe we should try to predict thousands (possibly millions) of computers simultaneously attacking our game and overloading our provider’s connections with traffic and do something about that.”

You don’t need a complex computer algorithm to predict that a high-profile target on the Internet is going to come under attack during a high-profile release of high-profile online software aimed to make even more millions of dollars.

You need a functioning human brain running your multimillion dollar technology corporation.

“Hmm. We have a lot of enemies who want our project to fail and we are entering a critical phase of our project that is highly vulnerable to attacks that could directly influence our future profits. We should implement any protection at all to keep it safe from malicious attacks coming from predictable, spoofed IPs. Tech team, get on that!”

Do I get my paycheck and executive position yet?

Several problems with that:

  1.  It’s not Blizzard who has to do the filtering. It has to be the people reflecting the traffic who needs to filter traffic.
  2. There’s tens of millions of these reflectors on the internet.
  3. It’s literally impossible to distinguish between valid traffic and traffic from a spoofed IP unless you’re directly adjacent to the source of the traffic.

Nice try, though!

You sound really pissy that I insulted the soulless corporation you worship. Jussayin’. 

And by the way, local servers can absolutely filter what traffic they receive. 

You go try to put a couple thousand entries into your machine’s local ACL and tell me how that works out 😉