lepoulsdumonde.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Small french Mastodon instance for friends, family and useful bots

Administered by:

Server stats:

52
active users

#ddos

2 posts2 participants0 posts today
Alex<p>Personally I don't mind my code being ingested to train <a href="https://mastodon.org.uk/tags/LLM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLM</span></a> models. Freedoms 1 and 3 of the four essential software freedoms allow for study and redistribution of modified versions of code. Of course those freedoms don't allow for stripping the license obligations from derivative code. They also don't give permission to for <a href="https://mastodon.org.uk/tags/scraper" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scraper</span></a> bots to <a href="https://mastodon.org.uk/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> our core development infrastructure by aggressively spamming git servers with requests: <a href="https://thelibre.news/foss-infrastructure-is-under-attack-by-ai-companies/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thelibre.news/foss-infrastruct</span><span class="invisible">ure-is-under-attack-by-ai-companies/</span></a> <a href="https://mastodon.org.uk/tags/git" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>git</span></a> <a href="https://mastodon.org.uk/tags/floss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>floss</span></a> <a href="https://mastodon.org.uk/tags/foss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>foss</span></a> <a href="https://mastodon.org.uk/tags/robots" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>robots</span></a></p>
Veronica Olsen 🏳️‍🌈🇳🇴🌻<p>Who could have guessed that an industry whose entire business model is based on theft would behave like malware attacks on the Internet? 🤔</p><p><a href="https://arstechnica.com/ai/2025/03/devs-say-ai-crawlers-dominate-traffic-forcing-blocks-on-entire-countries/?utm_source=mastodon&amp;utm_medium=social" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/ai/2025/03/dev</span><span class="invisible">s-say-ai-crawlers-dominate-traffic-forcing-blocks-on-entire-countries/?utm_source=mastodon&amp;utm_medium=social</span></a></p><p><a href="https://mastodon.online/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://mastodon.online/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> <a href="https://mastodon.online/tags/Crawlers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Crawlers</span></a></p>
Dendrobatus Azureus<p>Artificial intelligence companies are creating incredibly large scale denial of service situations on the infrastructure of Open Source Networks.</p><p>Now Network owners need to waste time on Finding ways of sending All These requests of the rogue AI insects to /dev/null</p><p><span class="h-card" translate="no"><a href="https://fuzzies.wtf/@altbot" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>altbot</span></a></span> </p><p><a href="https://mastodon.bsd.cafe/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> <a href="https://mastodon.bsd.cafe/tags/DenialOfService" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DenialOfService</span></a> <a href="https://mastodon.bsd.cafe/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://mastodon.bsd.cafe/tags/LLM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLM</span></a> <a href="https://mastodon.bsd.cafe/tags/KDE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KDE</span></a> <a href="https://mastodon.bsd.cafe/tags/crawler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crawler</span></a> <a href="https://mastodon.bsd.cafe/tags/programming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>programming</span></a> <a href="https://mastodon.bsd.cafe/tags/Alibaba" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Alibaba</span></a> <a href="https://mastodon.bsd.cafe/tags/IP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IP</span></a> <a href="https://mastodon.bsd.cafe/tags/FOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSS</span></a> <a href="https://mastodon.bsd.cafe/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://mastodon.bsd.cafe/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> </p><p><a href="https://thelibre.news/foss-infrastructure-is-under-attack-by-ai-companies/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thelibre.news/foss-infrastruct</span><span class="invisible">ure-is-under-attack-by-ai-companies/</span></a></p>
Max Resing<p>Last week was another stakeholder meeting on <a href="https://infosec.exchange/tags/DNS4EU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS4EU</span></a>. <a href="https://infosec.exchange/tags/Whalebone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Whalebone</span></a> provided a short overview of the project including a timeline. Public launch is scheduled for June this year. The talk elaborates on various considerations of the new <a href="https://infosec.exchange/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a> project. I was mostly interested in the deployment aspect, the <a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> slides and the <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> and <a href="https://infosec.exchange/tags/anonymization" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>anonymization</span></a> mechanisms.</p><p>My personal main concern with the project is the absence of resolver technology. The project plainly uses the <a href="https://infosec.exchange/tags/KnotDNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KnotDNS</span></a> resolver. Not a bad choice, but University taught me that diversity in the backend software introduces even more resiliency. Yet, as Whalebone is a <a href="https://infosec.exchange/tags/Czech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Czech</span></a> company, it is apparent why they chose <a href="https://infosec.exchange/tags/KnotDNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KnotDNS</span></a> exclusively.</p><p>The <a href="https://142290803.fs1.hubspotusercontent-eu1.net/hubfs/142290803/PDF%20files/Workshop%20DNS4EU%20Public%20resolvers%20Slidedeck.pdf" rel="nofollow noopener" target="_blank">slides</a> are public.</p>