@fcbsd @ireneista I wonder how hard it would be to make a zip bomb type file be returned with the built in compression in http requests for anything malicious looking.
Could just expand to "403 get lost" or something a trillion times.
@fcbsd @ireneista you know those git repos that have been causing all sorts of problems recently for (mostly) vibe coders?
Since they're often scraping .git or .env I wouldn't be surprised if you could have it even run ~~malicious~~ defensive code if the scraper bots are built badly enough (or the operator curious enough).
Might be a good way to get your domain flagged for malware though, ironically.
@jwdt @fcbsd as kids we had a 2400 baud modem
we would telnet into Unix servers and every so often there'd be a latency spike and we wouldn't be able to see what we were typing for several seconds
and if we were doing anything web-related in another window we could track the progress of the web requests by how they affected the telnet session
@fcbsd or at least it should be the same speed for everyone, because that's justice
we think intentionally slowing down, for things that don't matter, can be defensible. like, not everything in life has to be instant gratification
@starlight yeah. we're trying hard to avoid installing a proof-of-waste tool, though we are really super glad that Anubis exists because it's a grassroots approach (cloudlfare are the amoral mercenaries of our age)
we're learning a lot from the process of exploring other mitigations, so that's worth it to us
@cthos ooo..... yes! yes, that would be amazing
System's Twilight, by @zarfeblong had this virtual "place" within its computer-setting, the river of data. the metaphor has stuck with us through the years.
@cthos maybe the portion that's http traffic could be printed as its three-digit response code
and the portion that's attempts to brute-force the passwords of ssh accounts that don't exist despite the initial response clearly stating that password login is prohibited could be printed as * (denoting an asshole) or something like that
~ character and we don't know what to map that to@ireneista everything about this idea sounds great. Maybe IP clusters are differently sized rocks that the request ~s flow around.
This might quickly become illegible but it is fun to think through