Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Wikileaks moves to Amazon's cloud to evade massive DDoS

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Latest Breaking News Donate to DU
 
PeaceNikki Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 07:27 PM
Original message
Wikileaks moves to Amazon's cloud to evade massive DDoS
Source: Ars Technica

Controversial information disclosure site Wikileaks reportedly faced an intense distributed denial of service (DDoS) attack this morning. The site was temporarily disrupted by the onslaught, but is functioning again after migrating its services to Amazon's cloud.

Wikileaks recently published thousands of confidential diplomatic cables that were sent between the US State Department and embassies around the world. The leaked documents shed light on US intelligence gathering efforts and reveal sensitive information pertaining to US foreign relations. The disclosure of the cables has proved embarrassing for the US and a number of other governments.

It's possible that the DDoS against Wikileaks was orchestrated by a government in effort to retaliate against the leak and disrupt access to the documents. Prominent figures in the US government, including a congressman, are calling for an extreme response to the leak, arguing that Wikileaks should be treated as a terrorist organization. The group is clearly facing considerable pressure and close scrutiny as a result of the leak.

Wikileaks says that the DDoS was pummeling its servers at 10 gigabits per second, forcing its Swedish hosting provider to discontinue operation of the site. In order to continue operating smoothly, Wikileaks moved its site to Amazon's elastic cloud computing infrastructure. This will allow it to scale better in the face of massive DDoS attacks.

Read more: http://arstechnica.com/security/news/2010/11/wikileaks-moves-to-amazons-cloud-to-evade-massive-ddos.ars
Printer Friendly | Permalink |  | Top
bemildred Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 07:34 PM
Response to Original message
1. Well, the obvious solution to a Distributed Denial of Service attack is
Edited on Tue Nov-30-10 07:35 PM by bemildred
a Distributed Provider of Service (DPOS) defense. So yeah. If you don't have bottlenecks or single points of failure, nobody can attack them.
:thumbsup:
Printer Friendly | Permalink |  | Top
 
PeaceNikki Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 07:37 PM
Response to Reply #1
2. I've had recent up close and personal exposure to these DDoS attacks so I find it all very
interesting.
Printer Friendly | Permalink |  | Top
 
bemildred Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 08:51 PM
Response to Reply #2
10. Well, it is worth remembering that everybody had permanent DDOS not so long ago.
Edited on Tue Nov-30-10 08:51 PM by bemildred
And a lot of the planet still does. It's not an impressive hack, no matter how you do it.
Printer Friendly | Permalink |  | Top
 
PeaceNikki Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 08:57 PM
Response to Reply #10
12. The way they distribute it is impressive and often quite effective.
The hack itself doesn't have to be highly sophisticated to do damage.

Printer Friendly | Permalink |  | Top
 
bemildred Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 09:05 PM
Response to Reply #12
13. Can be.
Edited on Tue Nov-30-10 09:09 PM by bemildred
That is relevant in this context, to why they won't be able to shut Wikileaks down, or the idea of it down, assuming as I do that they won't. You can make it as messy as you need to, a classic arms race. And I will be the first to admit that it takes skill and effort.

But good hacks do good. DDOS is just showing off, censorship, and there is no repairing that flaw.
Printer Friendly | Permalink |  | Top
 
Pavulon Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 09:19 PM
Response to Reply #13
19. DDOS is childish. Man in the middle
and compromising certificates with a disposable vm running in main memory of say a printer is elegant. Breaking EC2's (amazon app and web hosting) backend and skimming data is elegant.

Elegance is nice but combined with root level access to Core Routers (12816 class gear), Cache Engines, and telecom gear allows data to actually be changed in flight.

Like the Iranian nuclear scientist who is now inside out proves targeting technology is far more difficult than targeting the people involved or people they are concerned about.
Printer Friendly | Permalink |  | Top
 
bemildred Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 09:27 PM
Response to Reply #19
22. Well, I don't follow that shit, never have.
I think security on the web is an oxymoron, and always have. But yeah. I do remember reading about the printers, I think I mentioned it.
Printer Friendly | Permalink |  | Top
 
bemildred Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 09:50 PM
Response to Reply #19
26. Approximate translation:
Edited on Tue Nov-30-10 09:58 PM by bemildred
Italics are mine.

DDOS is childish. Man in the middle (the sort of routing redirection alleged to have been done by the Chinese a few days ago) and compromising (encryption) certificates with a disposable vm (virtual machine) running in main memory of say a printer is elegant. Breaking EC2's (Elastic Computing Cloud's) (amazon app and web hosting) backend (non-web processing, whatever that might be) and skimming data is elegant.

Elegance is nice but combined with root level access to Core Routers (12816 class gear) (Fast Cisco network routers), Cache Engines and telecom gear allows data to be changed in flight. (This is about where you insert yourself into a transaction and lie to both parties while collecting information, doing evil etc.)

Like the Iranian scientist who is now inside out (dead) proves that targeting technology is far more difficult than targeting the people involved or the people they are concerned about.

I had to google a few things and infer a few things, but I think that's more of less right?
Printer Friendly | Permalink |  | Top
 
Pavulon Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 10:49 PM
Response to Reply #26
32. Yep, kids come in and break the dishes.
professionals leave everything untouched and no one knows anything even happened. Professionals would just wait and let the parties do their thing whole gathering info useful to deal with them legally (or illegally). Elegance is injecting minor variations into motor controllers to cause a centrifuge to fail. That is elegant because it accomplished what a bomb would do with no harm to people.

CALEA allows legal interception of both voice and data on networks.

The whole security logic always revolves around people. People can take a highly secure system and circumvent it by loaning out their ID badge and password.
Printer Friendly | Permalink |  | Top
 
bemildred Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 11:10 PM
Response to Reply #32
35. Social engineering has always been the gold standard in these things.
A couple questions:

1.) From what I read in Schneier, encryption certificates ought not be hackable by man in the middle attacks. I mean that's the whole idea. Is that wrong, and if it is wrong, how is it wrong? Am I just out of date? Are we assuming some social engineering? Quantum computers?

2.) Near as I can tell, Wikileaks is not about hacking as such, it just provides a place for leakers to send things, so it's not correct that either Amazon or Wikileaks have hacked the federal government. If Assange or Wikileaks gets it in the legal system, it will be about publishing classified stuff. So the only way hacking is relevant to Wikileaks (excluding Assange's past) is them being hacked by various parties they have pissed off. Right?
Printer Friendly | Permalink |  | Top
 
Pavulon Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 08:15 PM
Response to Reply #1
3. Break the API calls used by amazon to manage the workload
workload dies. Cloud compute has some interesting vulnerabilities. Kinda mainfraimish, rob the workload of resources and it will be sad.
Printer Friendly | Permalink |  | Top
 
PeaceNikki Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 08:24 PM
Response to Reply #3
4. It's amazing to watch the attacks evolve with the infrastructure changes made to fight them
and they do.
Printer Friendly | Permalink |  | Top
 
liberation Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 08:34 PM
Response to Reply #3
5. LOL...
... "break the API calls" You got no clue what you're talking about, do you?
Printer Friendly | Permalink |  | Top
 
Name removed Donating Member (0 posts) Send PM | Profile | Ignore Tue Nov-30-10 08:39 PM
Response to Reply #5
6. Deleted message
Message removed by moderator. Click here to review the message board rules.
 
liberation Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 09:38 PM
Response to Reply #6
25. Derp... derp.... derp....
Edited on Tue Nov-30-10 09:41 PM by liberation
All that noise and yet not a word on how you exactly "break the API calls."

LOL
Printer Friendly | Permalink |  | Top
 
Pavulon Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 10:42 PM
Response to Reply #25
30. How would you step in the middle of an encrypted conversation? How would you interrupt
the conversation. You can google CVEs for EC2 backend management.

I am not going to discuss how to commit a felony, you can look up how to make TATP or how to run a man in the middle, port based attacks, how to use wireshark, or cert hack on your own.

You dont even have to break into the conversation, all you have to do is interrupt the conversation across a range of ports.

Could be malformed packets, could be some published exploit, breaking the calls does not mean intercepting them, just making them time out.

Nothing in this post is not common knowledge, none of this construes intent on my part to encourage or commit a crime.

Printer Friendly | Permalink |  | Top
 
sudopod Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 11:08 PM
Response to Reply #30
34. Because if it's so easy, you'd think someone would do it and steal
an Amazon customer's online business database or something.
Printer Friendly | Permalink |  | Top
 
Pavulon Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-01-10 08:35 AM
Response to Reply #34
38. Different system, this is a hosting solution
and it is not easy and people do steal from e com sites every day.
Printer Friendly | Permalink |  | Top
 
SirRevolutionary Donating Member (129 posts) Send PM | Profile | Ignore Wed Dec-01-10 03:41 AM
Response to Reply #6
37. Ooooooooof, way to call your fellow DUer....
a fucking POON. You were referring to the plant, right??? Seriously Sgt Gunnery Hartman, are you just pissed because Julian didn't ask you out first? Explain in 50 words or less how your cloud definition floats in superiority to your competitor's clouds. Here's the catch though, don't sound stupid. Ready? GO!!
Printer Friendly | Permalink |  | Top
 
SirRevolutionary Donating Member (129 posts) Send PM | Profile | Ignore Tue Nov-30-10 08:43 PM
Response to Reply #5
8. See? It's a series of tubes...
break a tube and they all get flooded with crapteria. :popcorn:
Printer Friendly | Permalink |  | Top
 
bemildred Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 08:49 PM
Response to Reply #3
9. Do it.
:popcorn:
Printer Friendly | Permalink |  | Top
 
Pavulon Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 08:55 PM
Response to Reply #9
11. Thats a felony brotha.
I was careful not to post anything that could even come close to advocating hacking people who hacked the federal government..
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 09:07 PM
Response to Reply #11
14. Hack the gibson!
:rofl:
Printer Friendly | Permalink |  | Top
 
bemildred Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 09:08 PM
Response to Reply #11
15. Ah, so you are merely suggesting that it could be done.
No question about that.
Printer Friendly | Permalink |  | Top
 
Pavulon Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 09:12 PM
Response to Reply #15
16. I could post CVE's would that be over the line?
This is a well known vector and something most people who run in a distributed environment account for anyway. Breaking telemetry is nothing new to the "cloud". Fuck I hate that term, Julian should leak the name of the person who first used that in the last few years. Tired of hearing about it and someone should put an ass beating down on the Cisco/VMware/whichever powerpoint guru that dropped that term.

Printer Friendly | Permalink |  | Top
 
bemildred Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 09:19 PM
Response to Reply #16
17. People who are interested will find it.
It's not hard. No need for you to get involved. Changes all the time anyway.

I have always considered "cloud computing" to be marketing bullshit anyway.
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 09:19 PM
Response to Reply #16
18. That would be a beat down for Ramnath Chellappa
He adopted it from the existing cloud metaphor long used for used for the PSTN/POTS.
Printer Friendly | Permalink |  | Top
 
Pavulon Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 09:22 PM
Response to Reply #18
20. I fucking hate that term. First cloud machines, then cloud apps, cloud storage, now MS
is pitching cloud on stupid TV. I think it is actually illegal to make a powerpoint now without the term cloud included.

Its like, we have a fairly simple thing, but need to give it a stupid catchy name. I actually had someone give me a visio with "cloud" and the little cloud stencil, fucking made them put the infrastructure in.
Printer Friendly | Permalink |  | Top
 
bemildred Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 09:25 PM
Response to Reply #20
21. LOL.
:thumbsup:
Printer Friendly | Permalink |  | Top
 
xor Donating Member (180 posts) Send PM | Profile | Ignore Wed Dec-01-10 09:18 AM
Response to Reply #18
40. Clouds have always been used as an abstraction of systems
It's not really an incorrect usage of the word cloud. After all, whether you're using IaaS, PaaS, SaaS *cough* now those are marketing terms, aye? *cough* then you have many of the complexities hidden away from you, and you interface with it at well defined points that eliminate much of the human interaction needed.
Printer Friendly | Permalink |  | Top
 
sudopod Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 11:03 PM
Response to Reply #3
33. Oh wow you're such a leet hax0r. *eye roll* nt
Printer Friendly | Permalink |  | Top
 
Pavulon Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-01-10 08:38 AM
Response to Reply #33
39. No I get paid for my work, own a home,
and dont eat hot pockets while sitting in front of 4chan. Never claimed it was a "hack". Is it a hack if someone calls the water company in your name and has your water cut off?

Those hacks were always more interesting than some code based solution.
Printer Friendly | Permalink |  | Top
 
sudopod Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Dec-02-10 07:05 PM
Response to Reply #39
66. This is my super-impressed face. :P nt
Printer Friendly | Permalink |  | Top
 
KamaAina Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-01-10 01:37 PM
Response to Reply #33
56. That's "l33t haX0r" to you.
:P
Printer Friendly | Permalink |  | Top
 
jtuck004 Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 08:39 PM
Response to Original message
7. Hmmm... /\ /\
Edited on Tue Nov-30-10 08:42 PM by jtuck004
:popcorn:

This discussion could be interesting
Printer Friendly | Permalink |  | Top
 
Earth_First Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 09:30 PM
Response to Original message
23. Couldn't they just call Al Gore?
:rofl:
Printer Friendly | Permalink |  | Top
 
BrightKnight Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 09:30 PM
Response to Original message
24. Where are they getting the resources?
You don't usually setup and maintain something like that in your basement. They must be paying someone for infrastructure and services. If I ran a data center the last thing that I would want is very angry and highly funded intelligence agencies coming after me. That could be very very bad for business.
Printer Friendly | Permalink |  | Top
 
bemildred Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 09:54 PM
Response to Reply #24
27. Sounds like Amazon lets you do that.
It's an interesting question whether this will lead to changes in that policy.
Printer Friendly | Permalink |  | Top
 
jtuck004 Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 11:57 PM
Response to Reply #24
36. You can read about it here...
Printer Friendly | Permalink |  | Top
 
SnakeEyes Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 10:16 PM
Response to Original message
28. A 'hacktivist"
has claimed responsibility for the DDoS.

I wonder if moved to Amazon's cloud makes them vulnerable to US laws
Printer Friendly | Permalink |  | Top
 
Pavulon Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 10:43 PM
Response to Reply #28
31. I am surprised amazon would host them.
their terms of use could be read as not allowing criminal activity.
Printer Friendly | Permalink |  | Top
 
Ruperto31 Donating Member (250 posts) Send PM | Profile | Ignore Wed Dec-01-10 12:45 PM
Response to Reply #31
50. Me too.
But then, as Lenin said, the capitalists will sell us the rope we use to hang them.
Printer Friendly | Permalink |  | Top
 
Kurska Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-30-10 10:18 PM
Response to Original message
29. This will last all of five seconds.
Before Amazon kicks them off after the massive consumer backlash.

As hard as it may be to tell from the normal "Fuck yeah" echo chamber, most people don't like this guy or what he is doing. At least as far as Americans go.
Printer Friendly | Permalink |  | Top
 
PeaceNikki Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-01-10 11:43 AM
Response to Reply #29
42. Yeah, it's going to be interesting.
Printer Friendly | Permalink |  | Top
 
xor Donating Member (180 posts) Send PM | Profile | Ignore Wed Dec-01-10 09:25 AM
Response to Original message
41. I was wondering why they haven't switched to a service like EC2
They don't even have to put much thought into how to handle this. I believe AWS now has an autoscaling service that will start up new instances without you needing to write the code to do it. Using that and the elastic load balancing seems like it would give them high availability. Then again, I wonder how long Amazon will host it if they are under constant attack and when customers start complaining. :/
Printer Friendly | Permalink |  | Top
 
Seedersandleechers Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-01-10 12:28 PM
Response to Original message
43. Wikileaks is now hosted by Amazon after massive DDoS attack
Edited on Wed Dec-01-10 11:24 AM by Seedersandleechers
Source: geek.com

When Wikileaks spilled thousands of confidential diplomatic cables to the world last week, they made themselves a few more enemies, not just in Washington, but in the capitols of many cities in the rest of the world. Retaliation came swiftly, not by way of a surgical execution squad, but rather by a massive DDOS (or distributed denial of service) attack, which through upwards of 10 gigabits per second at Wikileaks’ Swedish host.

That’s a lot of traffic, and it has all the hallmarks of a government-led attack. In fact, the DDoS attack on Wikileaks’ homepage was so massive in scope that it successfully knocked the leak site off of the Internet, and forcing the host to discontinue ioperation of the site.

You simply can’t keep a site like Wikileaks down for the count, though. Wikileaks is now back up, speedier than ever, thanks to Amazon.

Yep, Amazon is now hosting Wikileaks thanks to their Amazon’s incredible and elastic cloud-hosting service, S3.

Read more: http://www.geek.com/articles/news/wikileaks-is-now-hosted-by-amazon-after-massive-ddos-attack-2010121/



Don't know how reliable geek.com is. Does anyone?
Printer Friendly | Permalink |  | Top
 
SkyDaddy7 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-01-10 12:28 PM
Response to Reply #43
44. I think they are...Other sources are saying the same thing...
Edited on Wed Dec-01-10 11:35 AM by SkyDaddy7
Printer Friendly | Permalink |  | Top
 
mike_c Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-01-10 12:28 PM
Response to Reply #43
45. they might be reasonably reliable-- WL has moved to Amazon-- but...
...they sure don't proof read!
Printer Friendly | Permalink |  | Top
 
florida08 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-01-10 12:28 PM
Response to Reply #43
46. looks like the WSJ is running it
Printer Friendly | Permalink |  | Top
 
NoodleyAppendage Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-01-10 12:28 PM
Response to Reply #43
47. I will be buying a book today from Amazon to reward this behavior. Recommend others do too. n/t
J
Printer Friendly | Permalink |  | Top
 
BrightKnight Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-01-10 02:45 PM
Response to Reply #47
58. Amazon made the wrong decision and I will not do business with them.
There is nothing heroic about posting classified documents that put American lives and diplomatic missions at risk. This goes beyond any political or regional conflict and is simply treason or espionage.

I am in favor of Internet freedom but what Amazon is doing is irresponsible.



Printer Friendly | Permalink |  | Top
 
intheflow Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-01-10 05:41 PM
Response to Reply #47
59. Hope you haven't been shopping yet.
Printer Friendly | Permalink |  | Top
 
fatbuckel Donating Member (518 posts) Send PM | Profile | Ignore Wed Dec-01-10 12:28 PM
Response to Reply #43
48. I wonder who is really behind the DDoS. Thats really massive to be just anyone.I could`nt do it.
That takes alot of computer. He should wikileak docs on who`s responsible.
Printer Friendly | Permalink |  | Top
 
molly77 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-01-10 12:28 PM
Response to Reply #48
49. fatbuckle
Do you think it is possible to know who is behind it?

I am barely computer literate. Sorry.
Printer Friendly | Permalink |  | Top
 
PeaceNikki Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-01-10 12:46 PM
Response to Reply #49
52. Yes. The FBI can drill into the source.
The attacked site won't be able to find out, but the FBI investigates these botnets.
Printer Friendly | Permalink |  | Top
 
BrightKnight Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-01-10 01:29 PM
Response to Reply #52
55. The FBI will be more interested in protecting National
security than any of Amazon's self inflicted hacking problems. Allowing Amazon to become a lightning rod for this kind of attack is a very bad security policy. It is not possible to defend against all treats. If I were hosting with Amazon now I would be worried and pissed off.
Printer Friendly | Permalink |  | Top
 
PeaceNikki Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-01-10 01:53 PM
Response to Reply #55
57. They have different people/divisions to handle these cyberattacks.
And they do take them seriously. I know from recent experience.
Printer Friendly | Permalink |  | Top
 
ProudDad Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-01-10 11:54 PM
Response to Reply #52
64. What if the FBI or CIA IS the source?
Edited on Wed Dec-01-10 11:54 PM by ProudDad
And I think it is...
Printer Friendly | Permalink |  | Top
 
PeaceNikki Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Dec-02-10 04:01 AM
Response to Reply #64
65. lolz
Printer Friendly | Permalink |  | Top
 
PeaceNikki Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-01-10 12:45 PM
Response to Reply #48
51. Anyone can BUY the botnets to do this kind of thing- they're cheap, too.
That's all I will say about that.
Printer Friendly | Permalink |  | Top
 
Pavulon Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-01-10 06:21 PM
Response to Reply #43
60. not any more. amazon kicked thier asses right out..
they will now be hosted somewhere else.
Printer Friendly | Permalink |  | Top
 
PeaceNikki Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-01-10 06:27 PM
Response to Reply #60
61. Go look at their Twitter feed
http://twitter.com/#!/wikileaks

WikiLeaks
WikiLeaks servers at Amazon ousted. Free speech the land of the free--fine our $ are now spent to employ people in Europe.

WikiLeaks
If Amazon are so uncomfortable with the first amendment, they should get out of the business of selling books.


WikiLeaks
WikiLeaks is the first global Samizdat movement. The truth will surface even in the face of total annihilation.

Drama queen much?
Printer Friendly | Permalink |  | Top
 
Pavulon Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-01-10 06:33 PM
Response to Reply #61
62. Amazon does not want their systems
on the end of a targeted attack. Wikileaks breaks their terms of use anyway.
Printer Friendly | Permalink |  | Top
 
PeaceNikki Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-01-10 06:38 PM
Response to Reply #62
63. Totally understandable. I wouldn't, either.
Printer Friendly | Permalink |  | Top
 
Name removed Donating Member (0 posts) Send PM | Profile | Ignore Wed Dec-01-10 12:46 PM
Response to Original message
53. Deleted message
Message removed by moderator. Click here to review the message board rules.
 
PeaceNikki Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-01-10 12:52 PM
Response to Reply #53
54. It could be ANYONE. DDoS attacks are really common and really cheap to buy
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Thu Apr 25th 2024, 01:55 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Latest Breaking News Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC