layer8.space is one of the many independent Mastodon servers you can use to participate in the fediverse.
Welcome to the 8th Layer of Madness Most topics are related to Linux, Anime, Music, Software and maaaany more PS: BSD is also welcome 😜

Administered by:

Server stats:

310
active users

#ddos

3 posts3 participants0 posts today
jbz<p>😎 Open source devs are fighting AI crawlers with cleverness and vengeance<br>—<span class="h-card" translate="no"><a href="https://mstdn.social/@TechCrunch" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>TechCrunch</span></a></span> </p><p>「 It’s intended to “slow down, confuse, and waste the resources of AI Crawlers and other bots that don’t respect ‘no crawl’ directives,” Cloudflare described in its blog post. Cloudflare said it feeds misbehaving AI crawlers “irrelevant content rather than extracting your legitimate website data.” 」</p><p><a href="https://techcrunch.com/2025/03/27/open-source-devs-are-fighting-ai-crawlers-with-cleverness-and-vengeance/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/03/27/open</span><span class="invisible">-source-devs-are-fighting-ai-crawlers-with-cleverness-and-vengeance/</span></a></p><p><a href="https://indieweb.social/tags/ddos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ddos</span></a> <a href="https://indieweb.social/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> <a href="https://indieweb.social/tags/aicrawlers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aicrawlers</span></a> <a href="https://indieweb.social/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a></p>
Epiphyt<p>ActivityPub is great to connect your WordPress blog to the Fediverse. However, depending on the activity, it is possible to create an accidental DDoS against the own server.</p><p> […]</p><p><a href="https://epiph.yt/en/blog/2025/accidental-ddos-through-activitypub-plugin/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">epiph.yt/en/blog/2025/accident</span><span class="invisible">al-ddos-through-activitypub-plugin/</span></a></p><p><a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://epiph.yt/en/blog/tag/activitypub/" target="_blank">#ActivityPub</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://epiph.yt/en/blog/tag/cachify/" target="_blank">#Cachify</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://epiph.yt/en/blog/tag/caching/" target="_blank">#Caching</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://epiph.yt/en/blog/tag/ddos/" target="_blank">#DDoS</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://epiph.yt/en/blog/tag/fediverse/" target="_blank">#Fediverse</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://epiph.yt/en/blog/tag/plugin/" target="_blank">#Plugin</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://epiph.yt/en/blog/tag/surge/" target="_blank">#Surge</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://epiph.yt/en/blog/tag/wordpress/" target="_blank">#WordPress</a></p>
Jordan<p>I've seen a real uptick the past couple of days in attacks on my IP address space. Not sure if I'm being targeted, or part of a wider campaign. Oh well, fail2ban makes quick work of them 😸</p><p><a href="https://fosstodon.org/tags/selfhosted" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfhosted</span></a> <a href="https://fosstodon.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://fosstodon.org/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://fosstodon.org/tags/ddos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ddos</span></a> <a href="https://fosstodon.org/tags/cyberattack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberattack</span></a> <a href="https://fosstodon.org/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> <a href="https://fosstodon.org/tags/fail2ban" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fail2ban</span></a> <a href="https://fosstodon.org/tags/subjam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>subjam</span></a></p>
Rachel Rawlings<p>I'm having trouble figuring out what kind of botnet has been hammering our web servers over the past week. Requests come in from tens of thousands of addresses, just once or twice each (and not getting blocked by fail2ban), with different browser strings (Chrome versions ranging from 24.0.1292.0 - 108.0.5163.147) and ridiculous cobbled-together paths like /about-us/1-2-3-to-the-zoo/the-tiny-seed/10-little-rubber-ducks/1-2-3-to-the-zoo/the-tiny-seed/the-nonsense-show/slowly-slowly-slowly-said-the-sloth/the-boastful-fisherman/the-boastful-fisherman/brown-bear-brown-bear-what-do-you-see/the-boastful-fisherman/brown-bear-brown-bear-what-do-you-see/brown-bear-brown-bear-what-do-you-see/pancakes-pancakes/pancakes-pancakes/the-tiny-seed/pancakes-pancakes/pancakes-pancakes/slowly-slowly-slowly-said-the-sloth/the-tiny-seed</p><p>(I just put together a bunch of Eric Carle titles as an example. The actual paths are pasted together from valid paths on our server but in invalid order, with as many as 32 subdirectories.)</p><p>Has anyone else been seeing this and do you have an idea what's behind it?</p><p><a href="https://infosec.exchange/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> <a href="https://infosec.exchange/tags/ddos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ddos</span></a> <a href="https://infosec.exchange/tags/webscraping" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webscraping</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Dissent Doe :cupofcoffee:<p>So apart from the attempt to open a lot of Facebook accounts using my domain, my site has also been under sporadic DDoS attacks. I hope you don't have too much trouble connecting at times. </p><p>And no, I have no idea who I ticked off now. 😂 </p><p><a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a></p>
AAKL<p>Sales pitch toward the end.</p><p>Akamai: DDoS Attack Trends in 2024 Signify That Sophistication Overshadows Size <a href="https://www.akamai.com/blog/security/ddos-attack-trends-2024-signify-sophistication-overshadows-size" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">akamai.com/blog/security/ddos-</span><span class="invisible">attack-trends-2024-signify-sophistication-overshadows-size</span></a> <span class="h-card" translate="no"><a href="https://bird.makeup/users/akamai_research" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>akamai_research</span></a></span> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a></p>
Erik C. Thauvin<p>DNS Attacks – Explained</p><p><a href="https://mastodon.social/tags/ddos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ddos</span></a> <a href="https://mastodon.social/tags/dns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dns</span></a> <a href="https://mastodon.social/tags/java" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>java</span></a></p><p><a href="https://svenruppert.com/2025/04/07/dns-attacks-explained/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">svenruppert.com/2025/04/07/dns</span><span class="invisible">-attacks-explained/</span></a></p>
Jure Repinc :linux: :kde:<p><span class="h-card" translate="no"><a href="https://toot.si/@kompot" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>kompot</span></a></span> Just a little thought I had in relation to this. Would it make any sense to report these DDoS attacks to national CERT authorities, e.g. <span class="h-card" translate="no"><a href="https://ioc.exchange/@sicert" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>sicert</span></a></span> here in Slovenia?</p><p><a href="https://mstdn.io/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> <a href="https://mstdn.io/tags/Internet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Internet</span></a> <a href="https://mstdn.io/tags/LLM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LLM</span></a> <a href="https://mstdn.io/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://mstdn.io/tags/CERT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CERT</span></a> <a href="https://mstdn.io/tags/DenialOfService" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DenialOfService</span></a></p>
LinuxNews.de<p>Nachdem diverse <a href="https://social.anoxinon.de/tags/ki" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ki</span></a> <a href="https://social.anoxinon.de/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> <a href="https://social.anoxinon.de/tags/crawler" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>crawler</span></a> besonders respektvoll mit den öffentlichen Ressourcen von Open Source Projekten umgehen, habe ich mich dazu entschlossen eben diese auszusperren. Wir hatten in der Vergangenheit crawls, die im <a href="https://social.anoxinon.de/tags/monitoring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>monitoring</span></a> als <a href="https://social.anoxinon.de/tags/ddos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ddos</span></a> gewertet wurden. </p><p>Diverse AS erfreuen sich nun einem dauerhaften 429, einige wenige die es für alle kaputt machen…</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://corteximplant.com/@Prozak" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Prozak</span></a></span> <span class="h-card" translate="no"><a href="https://fediscience.org/@seanfobbe" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>seanfobbe</span></a></span> Lets say <span class="h-card" translate="no"><a href="https://social.anoxinon.de/@Codeberg" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Codeberg</span></a></span> did suffer some serious <a href="https://infosec.space/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> (which OFC isn't their fault) so I'd rather see <a href="https://infosec.space/tags/SelfHosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SelfHosting</span></a> as a better option...</p><ul><li>Needless to say I'm likely considering as a <a href="https://infosec.space/tags/public" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>public</span></a> <a href="https://infosec.space/tags/mirror" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mirror</span></a> / <a href="https://infosec.space/tags/public" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>public</span></a> <a href="https://infosec.space/tags/git" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>git</span></a> once I'd actually change my setups.</li></ul><p>It's just.currently.not.my.priority, but *my.priorities.ain't authoritative...</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://fediscience.org/@seanfobbe" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>seanfobbe</span></a></span> personally I'd consider <a href="https://infosec.space/tags/gitea" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gitea</span></a> and <a href="https://infosec.space/tags/SelfHosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SelfHosting</span></a>.</p><ul><li>As of now I abude <a href="https://infosec.space/tags/github" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>github</span></a> as free, <a href="https://infosec.space/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a>-protected hosting and something <a href="https://infosec.space/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> burns money in.</li></ul><p>Once any of my projects would gain traction I'd move from there away.</p><ul><li>I just am not a huge fan of <span class="h-card" translate="no"><a href="https://social.anoxinon.de/@Codeberg" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Codeberg</span></a></span> even tho they are a better option.</li></ul><p>I jist move to either SelfHosting or nowhere...</p>
Haack’s Networking<p>Managing AI Bots+ w/ Apache MPM, FPM, &amp; Fail2Ban: <a href="https://tech.haacksnetworking.org/2025/04/06/managing-ai-bots-w-apache-mpm-fpm-fail2ban/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tech.haacksnetworking.org/2025</span><span class="invisible">/04/06/managing-ai-bots-w-apache-mpm-fpm-fail2ban/</span></a> There's been a lot of continued discussion on this topic, so I decided to investigate some of the common reports, compare those to my own hardware, theoretical ceilings and caps, and then adjusted my LAMP stack and fail2ban as per this blog entry. Let me know what yall think or if you find any errors or questionable claims. -oemb1905 <a href="https://gnulinux.social/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> <a href="https://gnulinux.social/tags/scraping" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scraping</span></a> <a href="https://gnulinux.social/tags/apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apache</span></a> <a href="https://gnulinux.social/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://gnulinux.social/tags/freesoftware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freesoftware</span></a> <a href="https://gnulinux.social/tags/floss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>floss</span></a> <a href="https://gnulinux.social/tags/ddos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ddos</span></a> <a href="https://gnulinux.social/tags/php" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>php</span></a></p>
spla :senyera: :vim:<p>Estic pensant en fer la prova del cotó, muntar un servidor <a href="https://mastodont.cat/tags/Forgejo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Forgejo</span></a> nou a veure si els bots de les <a href="https://mastodont.cat/tags/IA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IA</span></a> el troben i el tomben a peticions (com un vulgar <a href="https://mastodont.cat/tags/DDOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDOS</span></a>) tal i com va passar amb el servidor Forgejo que teníem a mastodont.cat i d'altres.</p>
Edwin G. :mapleleafroundel:<p>Distributed denial of service (DDoS) attacks in 2024 at OVH. </p><p><a href="https://blog.ovhcloud.com/a-brief-retrospective-of-network-layer-ddos-attacks-in-2024-at-ovhcloud/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.ovhcloud.com/a-brief-retr</span><span class="invisible">ospective-of-network-layer-ddos-attacks-in-2024-at-ovhcloud/</span></a><br>- - -<br>Attaques de déni de service distribuées (DDoS) en 2024 chez OVH. </p><p>// Publication en anglais //</p><p><a href="https://mstdn.moimeme.ca/tags/OVH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OVH</span></a> <a href="https://mstdn.moimeme.ca/tags/OVHcloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OVHcloud</span></a> <a href="https://mstdn.moimeme.ca/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mstdn.moimeme.ca/tags/Cybers%C3%A9curit%C3%A9" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersécurité</span></a> <a href="https://mstdn.moimeme.ca/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://mstdn.moimeme.ca/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://em.erge.to/users/LunaDragofelis" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>LunaDragofelis</span></a></span> Consider <a href="https://infosec.space/tags/blackholing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blackholing</span></a> entire <a href="https://infosec.space/tags/ASN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ASN</span></a>|s like <a href="https://infosec.space/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a> and all the ofther <a href="https://infosec.space/tags/GAFAMs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GAFAMs</span></a> instead.</p><ul><li>It's the only way to stop these <a href="https://infosec.space/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> attacks!</li></ul><p><a href="https://www.youtube.com/watch?v=Hi5sd3WEh0c" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=Hi5sd3WEh0c</span><span class="invisible"></span></a></p>
vascorsd<p>«There’s been something of an epidemic of malicious bots on the internet these days. You may have seen a post recently titled “Please stop externalizing your costs directly into my face“, or “FOSS infrastructure is under attack by AI companies“. Those are all happening to us, too. Surprise.»</p><p>TCRF has been getting DDoSed – Xkeeper's blog - <a href="https://blog.xkeeper.net/uncategorized/tcrf-has-been-getting-ddosed/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.xkeeper.net/uncategorized</span><span class="invisible">/tcrf-has-been-getting-ddosed/</span></a></p><p><a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/AIShit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AIShit</span></a> <a href="https://mastodon.social/tags/AIPocalypse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AIPocalypse</span></a> <a href="https://mastodon.social/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Camelia :tranarchy_a_nonbinary: 🇵🇸<p>I'm getting <a href="https://tech.lgbt/tags/DDOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDOS</span></a>-ed by <a href="https://tech.lgbt/tags/AIcrawlers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AIcrawlers</span></a> right now, even though I have a strict robots.txt.</p><p>Outgoing traffic suddenly increased (more or less 10 times regular traffic).</p><p>I have to block their crap using my firewall. That's NOT OK.</p><p><a href="https://tech.lgbt/tags/LLMCrawlers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LLMCrawlers</span></a> <a href="https://tech.lgbt/tags/StopAI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>StopAI</span></a></p>
Venkatesh-Prasad Ranganath<p>An interesting code hosting related downside of AI. <a href="https://mastodon.social/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> <a href="https://mastodon.social/tags/ddos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ddos</span></a> <a href="https://mastodon.social/tags/web" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>web</span></a> <a href="https://mastodon.social/tags/scraping" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scraping</span></a> <a href="https://mastodon.social/tags/copyright" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>copyright</span></a> <a href="https://mastodon.social/tags/code" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>code</span></a></p><p><a href="https://techcrunch.com/2025/03/27/open-source-devs-are-fighting-ai-crawlers-with-cleverness-and-vengeance/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/03/27/open</span><span class="invisible">-source-devs-are-fighting-ai-crawlers-with-cleverness-and-vengeance/</span></a></p>
Esther Menhard<p>Daten-hungrige KI-Bots zwingen (versehentlich) <a href="https://openbiblio.social/tags/foss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>foss</span></a> Websites in die Knie <a href="https://openbiblio.social/tags/ki" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ki</span></a> <a href="https://openbiblio.social/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> <a href="https://openbiblio.social/tags/ddos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ddos</span></a> <a href="https://openbiblio.social/tags/crawler" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>crawler</span></a> <a href="https://arstechnica.com/ai/2025/03/devs-say-ai-crawlers-dominate-traffic-forcing-blocks-on-entire-countries/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/ai/2025/03/dev</span><span class="invisible">s-say-ai-crawlers-dominate-traffic-forcing-blocks-on-entire-countries/</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@bagder" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>bagder</span></a></span> seriously, wtf?</p><p>This <em>is</em> a <a href="https://infosec.space/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> attack...</p>