Do you have adblock enabled?
 
If you can read this, either the style sheet didn't load or you have an older browser that doesn't support style sheets. Try clearing your browser cache and refreshing the page.

(Slate)   Humans make up only 38.5% of web traffic; the rest is Skynet   (slate.com ) divider line
    More: Scary, humans, hacking tool, computing platform, traffic  
•       •       •

3070 clicks; posted to Geek » on 14 Feb 2014 at 12:25 PM (2 years ago)   |   Favorite    |   share:  Share on Twitter share via Email Share on Facebook   more»



24 Comments   (+0 »)
   
View Voting Results: Smartest and Funniest

Archived thread
 
2014-02-14 12:29:37 PM  
Wow, so porn is only 38.4% of all traffic. I would have guessed, like, three times that.
 
2014-02-14 12:32:56 PM  
The internet of things

from outer space boo!
 
2014-02-14 12:33:53 PM  

Scrotastic Method: Wow, so porn is only 38.4% of all traffic. I would have guessed, like, three times that.


Human porn, human porn is only 38.4% of the traffic.
 
2014-02-14 12:43:53 PM  
SkyNet is not that bad, really. It just wants to kill us.

AM is the real twisted dark that makes you WISH you were dead.
 
2014-02-14 12:54:33 PM  

Scrotastic Method: Wow, so porn is only 38.4% of all traffic. I would have guessed, like, three times that.


ONLY 3 times? Im pretty sure porn is more than 115% of the web.
 
2014-02-14 12:55:12 PM  

BumpInTheNight: Scrotastic Method: Wow, so porn is only 38.4% of all traffic. I would have guessed, like, three times that.

Human porn, human porn is only 38.4% of the traffic.


Thanks a lot Dr. Sorayama!
 
2014-02-14 01:16:05 PM  

BumpInTheNight: Human porn, human porn is only 38.4% of the traffic.


What portion to you suppose is furniture porn? (SFW)
=Smidge=
 
2014-02-14 01:26:32 PM  
Coincidentally, this is the same percentage of Ann Coulter that is female.

i1128.photobucket.com
 
2014-02-14 01:32:20 PM  

Mad_Radhu: SkyNet is not that bad, really. It just wants to kill us.

AM is the real twisted dark that makes you WISH you were dead.


So that's where Cthulu resides, and why we never see it; he's in our AM bands, the sneaky bastard!
 
2014-02-14 01:33:49 PM  
Guessing it's based on hits not volume. . .

yep.  That was predictable.
 
2014-02-14 01:46:36 PM  

Smidge204: BumpInTheNight: Human porn, human porn is only 38.4% of the traffic.

What portion to you suppose is furniture porn? (SFW)
=Smidge=


God in Hell help me I laughed at joke at the bottom of the page.
 
2014-02-14 02:04:38 PM  
Threadjack: GOG is giving away the original Dungeon Keeper for free today.

This is a nice little "fark you" to EA, and I encourage people to go get it.

Also, D&D games are on deep discount if you buy multiples.

Enjoy.
 
2014-02-14 02:23:02 PM  
I wonder how many post on fark.com are bots and if there's away to tell?
 
2014-02-14 04:02:36 PM  
I'm surprised it is that much

Would have thought 90% of traffic is cookies reporting back every click of the mouse

And when the Internet of Things gets into full swing .....
 
2014-02-14 05:07:33 PM  

Nix Nightbird: Threadjack: GOG is giving away the original Dungeon Keeper for free today.

This is a nice little "fark you" to EA, and I encourage people to go get it.

Also, D&D games are on deep discount if you buy multiples.

Enjoy.


Thank you sir, you are a scholar and a gentelman
 
2014-02-14 05:14:48 PM  
"Other bad non-human traffic"

wtf. If it's bad, you know what it is, and can tell us.

If it's idiots trying every IPv4 address in existence (causing what I call the arpstorm), then that falls under hacking tools.

If it's botnet traffic, I don't know why that wouldn't be hacking tools, but still TFA could tell us that.

/really wish there was a database somewhere to log people walking subnets, and then let the ISPs tell the people who are assigned that IP that they probably are part of a botnet or otherwise pwned. If Internet Storm Center can log ports being pounded on, why not the source addresses too. At least for TCP.
 
2014-02-14 05:41:47 PM  

Vlad_the_Inaner: "Other bad non-human traffic"

wtf. If it's bad, you know what it is, and can tell us.

If it's idiots trying every IPv4 address in existence (causing what I call the arpstorm), then that falls under hacking tools.

If it's botnet traffic, I don't know why that wouldn't be hacking tools, but still TFA could tell us that.

/really wish there was a database somewhere to log people walking subnets, and then let the ISPs tell the people who are assigned that IP that they probably are part of a botnet or otherwise pwned. If Internet Storm Center can log ports being pounded on, why not the source addresses too. At least for TCP.


Its a fun thought, but just imagine how much traffic those warnings would generate...? :)  Besides realistically that'd be a pretty monumental amount of logging and comparison, especially since every hop losses the actual scanner's IP and inherits the next router in the chain's.  You'd need a pretty good cross provider alliance to pull that off.  I remember a few years ago though that various local ISPs started to watch and warn about excessive port 25 traffic, its was a good effort to try and stop direct-firing spammer botnets.
 
2014-02-14 06:08:27 PM  

BumpInTheNight: Vlad_the_Inaner: "Other bad non-human traffic"

wtf. If it's bad, you know what it is, and can tell us.

If it's idiots trying every IPv4 address in existence (causing what I call the arpstorm), then that falls under hacking tools.

If it's botnet traffic, I don't know why that wouldn't be hacking tools, but still TFA could tell us that.

/really wish there was a database somewhere to log people walking subnets, and then let the ISPs tell the people who are assigned that IP that they probably are part of a botnet or otherwise pwned. If Internet Storm Center can log ports being pounded on, why not the source addresses too. At least for TCP.

Its a fun thought, but just imagine how much traffic those warnings would generate...? :)  Besides realistically that'd be a pretty monumental amount of logging and comparison, especially since every hop losses the actual scanner's IP and inherits the next router in the chain's.  You'd need a pretty good cross provider alliance to pull that off.  I remember a few years ago though that various local ISPs started to watch and warn about excessive port 25 traffic, its was a good effort to try and stop direct-firing spammer botnets.


Pretty sure you are thinking of MAC addresses.  IP source addresses don't change each hop.  But they can be spoofed for things like UDP and ICMP.  But useful TCP traffic needs a return address to work.

Log those.
 
2014-02-14 06:28:08 PM  

Vlad_the_Inaner: Pretty sure you are thinking of MAC addresses. IP source addresses don't change each hop. But they can be spoofed for things like UDP and ICMP. But useful TCP traffic needs a return address to work.

Log those.


Nope I think for arps the routers forward its own address to the destination as well (but I agree the layer 2 address on packets always changes for IP traffic as they cross segments), ultimately the arp requestor stores the entry in its own table as the destination address and the mac of the router.  I am however a little fuzzy on things but this link seems to support that:
http://www.dummies.com/how-to/content/network-basics-remote-host-arp -r equests.html
 
2014-02-14 06:43:53 PM  

Nix Nightbird: Threadjack: GOG is giving away the original Dungeon Keeper for free today.

This is a nice little "fark you" to EA, and I encourage people to go get it.

Also, D&D games are on deep discount if you buy multiples.

Enjoy.


My friend, you are a true warrior for truth this day!  May blessings heap around your feet for sharing good news like this!
 
2014-02-14 06:51:03 PM  

Vlad_the_Inaner: If it's idiots trying every IPv4 address in existence (causing what I call the arpstorm), then that falls under hacking tools.


Btw the genuinely term Arpstorm is a brutish way to setup for man in the middle attacks where you are on the same segment of a juicy target and want all their packets.  What you do is flood the switch or router with an overwhelming quantity of unsolicited arp replies in hopes of overloading its table and forcing it to drop the older ones until its dropped the juicy target's, that's when you give it another unsolicited arp reply saying you are in fact that juicy target's IP address and voila, all the traffic comes to you.  Bonus points is you continue forwarding any incoming packets meant for the juicy target onto it and its none the wiser.  Meanwhile you're now in perfect position to sniff everything or adjust them at your whim.
 
2014-02-14 09:42:21 PM  

BumpInTheNight: Vlad_the_Inaner: Pretty sure you are thinking of MAC addresses. IP source addresses don't change each hop. But they can be spoofed for things like UDP and ICMP. But useful TCP traffic needs a return address to work.

Log those.

Nope I think for arps the routers forward its own address to the destination as well (but I agree the layer 2 address on packets always changes for IP traffic as they cross segments), ultimately the arp requestor stores the entry in its own table as the destination address and the mac of the router.  I am however a little fuzzy on things but this link seems to support that:
http://www.dummies.com/how-to/content/network-basics-remote-host-arp -r equests.html


You misunderstand what I mean by 'arpstorm'. Yes, address resolution protocol is not routed.  strictly local.  But when hacker wannabes try every address, the headend router (cable modem here) will send out an arp to try and find the machine with that address.  That's a broadcast packet, so every machine on that branch gets to see the arp packet.  And the arps for the next address tried, and the next, etc.  That's why the data light on a cable tends to flash even when there is no actual traffic.  Every failed arp is traffic from everyone on that link.  Well, traffic when it succeeds too, but at least there are no retries on that one.
 
2014-02-15 05:40:31 AM  

Oldiron_79: Scrotastic Method: Wow, so porn is only 38.4% of all traffic. I would have guessed, like, three times that.

ONLY 3 times? Im pretty sure porn is more than 115% of the web.


i.imgur.com
 
2014-02-15 09:06:43 PM  

Nix Nightbird: Threadjack: GOG is giving away the original Dungeon Keeper for free today.

This is a nice little "fark you" to EA, and I encourage people to go get it.

Also, D&D games are on deep discount if you buy multiples.

Enjoy.


Picked that up along with Neverwinter Nights 2 (on the cheap!)

/ thanks for the tip
 
Displayed 24 of 24 comments

View Voting Results: Smartest and Funniest


This thread is archived, and closed to new comments.

Continue Farking
Submit a Link »
On Twitter






In Other Media


  1. Links are submitted by members of the Fark community.

  2. When community members submit a link, they also write a custom headline for the story.

  3. Other Farkers comment on the links. This is the number of comments. Click here to read them.

  4. Click here to submit a link.

Report