←back to thread

454 points positiveblue | 6 comments | | HN request time: 0.001s | source | bottom
Show context
cyberlurker ◴[] No.45066415[source]
I would love that vision to become reality but what Cloudflare is doing is unfortunately necessary atm.
replies(1): >>45066504 #
1. TheCraiggers ◴[] No.45066504[source]
Ok, I'll bite. Why is turning the Internet into a walled garden necessary now?
replies(3): >>45066632 #>>45066673 #>>45066804 #
2. giantrobot ◴[] No.45066632[source]
Multi-Tbps DDoS attacks, pervasive scanning of sites for exploits, comically expensive egress bandwidth on services like AWS, and ISPs disallowing hosting services on residential accounts.
replies(1): >>45066765 #
3. doublerabbit ◴[] No.45066765[source]
Start forcing tighter security on the devices causing the Multi-Tbps DDoS attacks would be a better option, no? Cheap unsecured IoT devices are a problem.

It's not just computers anymore. Web enabled CCTV, doorbell cameras are all culprits.

replies(2): >>45066820 #>>45066850 #
4. esseph ◴[] No.45066804[source]
Commercial, criminal, and state interests have far more resources than you do, and their interests are in direct conflict with yours.

That would be fine, you could walk away and go home, but if you're going to drive on their digital highways, you're going to need "insurance" just protect you from everyone else.

Ongoing multi-nation WWIII-scale hacking and infiltration campaigns of infrastructure, AI bot crawling, search company and startup crawling, security researchers crawling, and maybe somebody doesn't like your blog and decides to rent a botnet for a week or so.

Bet your ISP shuts you off before then to protect themselves. (Happens all the time via BGP blackholing, DDoS scrubbing services, BGP FlowSpec, etc).

5. esseph ◴[] No.45066820{3}[source]
And home routers, printers, and end user devices themselves. Residential ISP networks can be infiltrated and remote CVE'd through browser calls at this point from a remote website. It's not even hard.
6. habinero ◴[] No.45066850{3}[source]
How would you secure someone else's devices?