Hacker News new | past | comments | ask | show | jobs | submit login

Seems like a reasonable strategy to me, but probably very infeasible for an attack already in progress if this tactic weren't planned and ready to go in advance. It would be something I'd investigate post-attack however to see if it's a viable strategy for mitigating future attacks.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: