Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Can you elaborate on that?

Do you mean like the RDP marketplaces should slow down so people cant find a computer near the skimmed credit card they bought so that visa transactions go through?

Or something more like corporate hacking?

Or back to the RDP to install monero mining botnets?

I’m just trying to figure out which one you are referring to as “overtaxing”



similar to the virus or with any sort of lotka/voltera dynamics you cant take so much of a targets budget that it cant survive, that means if you subsist off others like animals do [consumers] those others[producers] must have enough "stuff" left to stay afloat or everyone goes down.

https://en.wikipedia.org/wiki/Lotka%E2%80%93Volterra_equatio...

there is a basis for mutual coexistence, it is a maladaptation for anyone to destroy the basis of your existence.

in particular the idea of ransoming or disrupting connectivity and integrity of critical data, info ,services or creating compounding issues. If someone makes thier living doing that, now is not the time for thier own sake as well.


I think tragedy of the commons will prevent this. Why should I hold back if I know that others won't?

https://en.wikipedia.org/wiki/Tragedy_of_the_commons


Yeah but the prey for blackhats numbers in the billions. There is an abundance upon which they can gorge.


up to a point when the prey develops a search image and avoids predation. this is when the predator search image must undergo behavioral extinction, and find a prey that can be harvested with some level of success. When exploitable individuals are no longer contactable the interpredatory competition has to thin out the predators, until more predation naive individuals are born or immigrate to the area etc.


oh, it would be weird for a hacker to do that kind of thing.

the vast majority of "hacks", the kinds with efficient markets, don't have those kinds of consequences, almost negligible consequences really.

nobody is trying to overload internet-connected generators or some infrastructure where there are consequences.

I just can't imagine what kinds of hacks you think are actually happening to fit your dynamic.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: