[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: [dvd-discuss] DoS attack on RIAA website
- To: dvd-discuss(at)cyber.law.harvard.edu
- Subject: RE: [dvd-discuss] DoS attack on RIAA website
- From: Jack Oskay <joskay(at)ix.netcom.com>
- Date: Wed, 31 Jul 2002 20:18:00 -0700
- In-reply-to: <E06ADA0073926048AD304115DD8AB6BC012396FB@mail.onetouch.com>
- Reply-to: dvd-discuss(at)cyber.law.harvard.edu
- Sender: owner-dvd-discuss(at)cyber.law.harvard.edu
Good point on multiple hosting and the DoS against 1000 P2P networks. How
to use a DoS against a 1000 or so users at different locations with
different access points? Each attack would hurt the entire system at the
different ISP(s). The part about "no facts to be released to the public"
is something that I missed and thanks for pointing it out.
Does anyone know what are the current laws against someone who does a DoS
attack?
I agree that it is not thought out at all. But with the general law
makers seeing the word DoS and not understanding it, could cause it to
pass. I am not expecting a worst case scenario but what would be a best
case scenario if it passed?
At 08:37 AM 7/31/2002 -0700, you wrote:
>Why assume _another_ country. As you said, the same
>servers sometimes host multiple different "sites".
>The same scenario could occur right here where major
>business sites may be sharing servers with something
>targetted for the RIAA.
>
>This legislation is ill (if at all) thought out, and I
>just hope that nothing _too_ serious results from whatever
>incident brings this back to the attention of the idiots
>who pass it.