centip3de wrote:mShred wrote:Well who knows. It's not like they can turn around and have a bot DDoS their system. Like the dude said, it could be aimed at trying to identify the attackers. But with that, I don't know how well that'd work depending on the attacker's security measures. But either way, I like it.
I dunno, if the attacker was an idiot and made no attempts to use a proxy, and or hid there I.P. in any way shape or form, I'd love to see an automated-rehacking-bot.
A proxy is hardly all you need to be anonymous these days.