• Buelldozer@lemmy.today
    link
    fedilink
    English
    arrow-up
    11
    arrow-down
    3
    ·
    22 hours ago

    what would be the solution?

    Simple, not allowing anonymous activity. If everything was required to be crypto-graphically signed in such a way that it was tied to a known entity then this could be directly addressed. It’s essentially the same problem that e-mail has with SPAM and not allowing anonymous traffic would mostly solve that problem as well.

    Of course many internet users would (rightfully) fight that solution tooth and nail.

    • MonkderVierte@lemmy.ml
      link
      fedilink
      English
      arrow-up
      5
      ·
      7 hours ago

      No, that’s not a solution, since it would make privacy impossible and bad actors would still find ways around.

    • shortwavesurfer@lemmy.zip
      link
      fedilink
      English
      arrow-up
      13
      ·
      22 hours ago

      Proof of work before connections are established. The Tor network implemented this in August of 2023 and it has helped a ton.

      • Buelldozer@lemmy.today
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        4 hours ago

        PoW uses a lot of electricity on the client side so environmentally it’s a poor solution, especially at scale.

        • shortwavesurfer@lemmy.zip
          link
          fedilink
          English
          arrow-up
          1
          ·
          2 hours ago

          For just accessing a simple resource, it does not use a whole lot of power because it only gets activated when the resource is under load and it helps to sort traffic based on effort placed to the POW puzzle. You can choose to place zero effort and be put in the back of the line, but people who choose to put in some small effort will be put in front of you, and people who put in a larger effort will be in front of them until the resource is no longer oversubscribed, and then it will drop back down to zero. That’s how the Tor network handles it and it works incredibly well. It has stopped the denial of service attacks in their tracks. In most cases, it’s hardly ever even active. Just because it is there, deters attacking it.