this post was submitted on 20 Mar 2025
499 points (100.0% liked)

Technology

67151 readers
6523 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 11 points 2 days ago (2 children)

what would be the solution?

Simple, not allowing anonymous activity. If everything was required to be crypto-graphically signed in such a way that it was tied to a known entity then this could be directly addressed. It's essentially the same problem that e-mail has with SPAM and not allowing anonymous traffic would mostly solve that problem as well.

Of course many internet users would (rightfully) fight that solution tooth and nail.

[–] [email protected] 8 points 1 day ago

No, that's not a solution, since it would make privacy impossible and bad actors would still find ways around.

[–] [email protected] 13 points 2 days ago (1 children)

Proof of work before connections are established. The Tor network implemented this in August of 2023 and it has helped a ton.

[–] [email protected] 3 points 1 day ago (1 children)

PoW uses a lot of electricity on the client side so environmentally it's a poor solution, especially at scale.

[–] [email protected] 1 points 1 day ago

For just accessing a simple resource, it does not use a whole lot of power because it only gets activated when the resource is under load and it helps to sort traffic based on effort placed to the POW puzzle. You can choose to place zero effort and be put in the back of the line, but people who choose to put in some small effort will be put in front of you, and people who put in a larger effort will be in front of them until the resource is no longer oversubscribed, and then it will drop back down to zero. That's how the Tor network handles it and it works incredibly well. It has stopped the denial of service attacks in their tracks. In most cases, it's hardly ever even active. Just because it is there, deters attacking it.