@[email protected] to Programmer [email protected] • 2 years agothis technology suffers from high latencylemmy.mlimagemessage-square60fedilinkarrow-up11.29K
arrow-up11.29Kimagethis technology suffers from high latencylemmy.ml@[email protected] to Programmer [email protected] • 2 years agomessage-square60fedilink
minus-square@[email protected]linkfedilink34•2 years agoThe protocol is highly susceptible to DOS attacks by means of BB guns, slingshots or, for more sophisticated hackers, trained hawks.
minus-square@[email protected]linkfedilink17•2 years ago“Unintentional encapsulation in hawks has been known to occur, with decapsulation being messy and the packets mangled.”
The protocol is highly susceptible to DOS attacks by means of BB guns, slingshots or, for more sophisticated hackers, trained hawks.
“Unintentional encapsulation in hawks has been known to occur, with decapsulation being messy and the packets mangled.”
more sophisticated hawkers, if you will
Or more sophisticated hawks