Hacker News new | past | comments | ask | show | jobs | submit login

If even Bulletproof hosts aren't safe why aren't malware authors using P2P infrastructure?



There is a difference between ignoring abuse reports and being immune to a raid by law enforcement. For these authors there is a trade-off between convenience, cost and security: using already available infrastructure is probably easier than to set up your own complicated hosting solution.

If any of them end up getting caught because of the information gathered by this raid they obviously misvalued one of these aspects in their trade-off analysis. Humans all make mistakes.


My guess would be that bulletproof hosts are safe enough for long enough that it's both money and time wise better/easier to deal with than p2p.


In order to keep a coherent network, most (all?) P2P infrastructure still requires some centralized resource to seed initial peers etc for a node. You would still have a single point of failure, if not for the network, at least for your control of it.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: