Talkiet:pohutukawa: snip
I don't know whether it's deliberate, but your questions are coming across as pretty aggressive and inflammatory.
I can promise you, Spark is doing a hell of a lot to improve the response to any future attacks of this nature. I can also promise you that there's no way we're going to tell random people on message boards exactly what we are doing from a resiliency and security design point of view.
Cheers - N
That's interesting, as I was thinking that all the Spark comments here were pretty aggressive towards anyone remotely critical of Spark, both in tone, and numbers of Spark employees here pulling rank.
What exactly is "aggressive" and "inflammatory". Please be specific so I know what you're talking about.
My guess is that you will reply saying that you don't have time, don't want to get into a slinging match, etc.
Let me be clear: I am not attacking anyone personally, but I *am* questioning the picture that has been painted by Spark to date. It's too easy to say people have been sucked in by malware pretending to be porn, oh those silly end-users.
Back to the issue...my questions are simply: 1. If Spark is going a hell of a lot more to improve the situation in the future, why wasn't this not done previously? The DNS DDoS amplification vector is not a new phenomenon. And it's not just a fibre/VDSL thing. and 2. Were Spark modems amongst the group of modems you previously mentioned?
Thanks for your up-front responses.



