Presumably changing the IP address that Wikileaks uses doesn't help because the bots doing the DDoS grab the IP address from DNS. Assuming Wikileaks doesn't mind the downtime (they're going to be down anyways) why not set the wikileaks web-related DNS entries to point to an IP address that fbi.gov or whitehouse.gov uses for, say, their email server?
Perhaps law enforcement might then have a vested interest in discovering the source of those attacks if their ability to receive email gets shot to hell.
>Apparently they're from the U.S., believe Julian Assange is a terrorist, and plan to keep attacking WikiLeaks for as long as possible.
This is silly. Judgements of Assange aside, isn't Wikileaks just a portal for a collection of torrents? If that's the case, what an utter waste of time and bandwidth.
How would this work against torrents? I'm not aware of them using trust-based systems. Certainly you can pollute the swarm and slow things down a bit, but anyone who eventually finds someone legitimate is barely even effected.
I found "…to escape justice into Ecuador. This would be a catalyst for many more like him to rise up in his place." more awkward. I also thought the lack of contractions was unusual as well given the general lack of formality otherwise.
But I think the writing sample size is too small to be very confident. Not that it matters too much, unless someone's trying to catch them.
Depends on the bandwidth. You can use services like CloudFlare for DDoS mitigation, and some hosts provide DDoS protection as well, but all of those services are expensive and WL is broke. Besides, the website itself is just a static collection of links, at the moment. Given that, the value of defending the website against temporary takedown probably doesn't justify the cost of doing so.
Some ISPs/hosts have DDoS protection, where they drop the traffic on their end (where the bandwidth is high) versus trying to drop it on your end (where the bandwidth is relatively low). Trying to break a DDoS on your end almost always results in your network dying when you're dealing with a dedicated, high bandwidth DoS.
Perhaps law enforcement might then have a vested interest in discovering the source of those attacks if their ability to receive email gets shot to hell.