(no title)
monerozcash | 1 month ago
> you would have to extract the keys from the malware
Yeah? That happens all the time. If you're designing mechanisms like this, it's presumably specifically against adversaries which are doing exactly that.
> you would then have to implement the logic and announce it - then rely on blockchain exploreres actually using that data to block addresses in real time.
Someone would only have to do this once and all your bots would be gone.
Usually the whole point of these mechanisms is C&C resilience, and usually that only matters for really big botnets which face co-ordinated attacks.
Any good C&C system for a bigger botnet would seek to eliminate all meaningful external points of failure for C&C. Using a block explorer, or HN comments, does not achieve that.
kachapopopow|1 month ago
but explorers are the easiest since there's so many of them and so many of them that do not give two shits about blacklisting addresses.
JasonADrury|1 month ago
You could've just used DHT, or even bundled Tor.
jhbafgshjk|1 month ago
[deleted]