getoffthedrugsdude@lemmy.ml to Programmer Humor@lemmy.ml · 2 years agothis technology suffers from high latencylemmy.mlimagemessage-square62linkfedilinkarrow-up11.35Karrow-down121file-text
arrow-up11.33Karrow-down1imagethis technology suffers from high latencylemmy.mlgetoffthedrugsdude@lemmy.ml to Programmer Humor@lemmy.ml · 2 years agomessage-square62linkfedilinkfile-text
minus-squareAceticon@lemmy.worldlinkfedilinkarrow-up35·2 years agoThe protocol is highly susceptible to DOS attacks by means of BB guns, slingshots or, for more sophisticated hackers, trained hawks.
minus-squarewizzor@sopuli.xyzlinkfedilinkarrow-up19·2 years ago“Unintentional encapsulation in hawks has been known to occur, with decapsulation being messy and the packets mangled.”
minus-squareitslilith@lemmy.blahaj.zonelinkfedilinkarrow-up5·2 years agomore sophisticated hawkers, if you will
The protocol is highly susceptible to DOS attacks by means of BB guns, slingshots or, for more sophisticated hackers, trained hawks.
“Unintentional encapsulation in hawks has been known to occur, with decapsulation being messy and the packets mangled.”
more sophisticated hawkers, if you will
Or more sophisticated hawks