This war is very close to my heart and I’ve been able to contribute some network capacity to pressure Russian servers, without any effect to other services I host, using my RPi4.

I added this entry to my docker-compose.yml and it fetched the targets and started spamming their servers (logs are in Ukranian).

services:
  mhddos_proxy:
    image: ghcr.io/porthole-ascend-cinnamon/mhddos_proxy
    restart: unless-stopped
    environment:
      - TZ=Asia/Tokyo
    deploy:
      mode: replicated
      replicas: 2

You may think it is “unethical” to disturb services, but I’m sure you understand who is the aggressor, what is at stake here and this is a completely free way to be on the right side of history.

More information here: https://bsky.app/profile/itarmy-ua.bsky.social

I am not related to the project, I just contribute the little I can.

  • TotallyHumanPinkySwear@lemmy.worldOP
    link
    fedilink
    English
    arrow-up
    0
    ·
    27 days ago

    It seems so. I guess I do not understand where the many requests/DDoS limit is and the ramifications it may entail in some jurisdictions, although, I explicitly wrote “DDoS” in the title…

    I had the impression that as a lone actor, lending CPU cycles, you do not fall into the latter category, since the state-sponsored attack, which I support in this instance, is carried out by a different entity.

    Perhaps, you would even argue that you have plausible deniability when accused of carrying out such attacks, just like the proprietor of a hacked device cannot be held liable (I assume). Definitely good to know.