(NaturalNews) A massive DDoS attack struck GoDaddy's name servers today, temporarily plunging thousands of websites into the internet abyss. "GoDaddy, the massive Web hosting company, went down on Monday, taking an untold number of websites with it," reported CNN
reported, "The more problematic part is that any domain registered with GoDaddy that uses its nameservers and DNS records are also down. This means that even if you host your site elsewhere, using GoDaddy for DNS means it is inaccessible."PC World
reports: "In a YouTube video (http://www.youtube.com/watch?v=SPGBZWGUE2g
), secretive hacking group Anonymous has taken credit for the outage, claiming the move is a reaction to the company's support of the U.S. government's efforts "to censor and control the Internet," through its support of the Stop Online Privacy Act (SOPA)."
But claiming Anonymous did this attack may be false, it turns out. The apparent attacker said, himself, that he was not affiliated with the Anonymous collective:
"It is not Anonymous collective it's only me. Don't use Anonymous collective name on it, just my name," wrote Twitter user Anonymous Own3r
Most likely scenario? A false flag cyber security attack
in order to provide the excuse for Obama to sign a freedom-killing executive order focused on "cyber security."
The attack has taken down GoDaddy's website, DNS servers, phone support and email accounts. It's almost as if a nuclear bomb
went off at GoDaddy
headquarters. This attack appears to be hugely successful from the point of view of Anonymous hackers, although it's not clear why GoDaddy was targeted in particular.
GoDaddy manages 48 million domains
spanning more than 9 million customers. The failure of its DNS likely means that millions of websites were taken offline.
Domain Name Servers are a known vulnerability
Domain Name Servers are a well-known vulnerability of the internet infrastructure. As this attack by Anonymous has masterfully demonstrated, DNS provides a centralized single point of attack
that, if penetrated, can bring down literally millions of websites
DNS also provides a single point of government seizure
, where rogue governments that hate free speech can take control over websites by commandeering their DNS records.
For these reasons, you need to know how to reach NaturalNews.com even if DNS is compromised
There is a workaround to DNS. You can bypass it and go straight to NaturalNews
by simply entering the following "IP address" into your browser:188.8.131.52
This is the equivalent of typing "NaturalNews.com" into your browser and it will work even if Domain Name Servers
are being hacked or seized. This IP address will take you right to our website. It is our "digital address" recognized by all web browsers.WRITE THIS NUMBER DOWN
on a piece of paper and carry it in your wallet or purse. Even if the Domain Name Servers are illegally seized by the government in an assault on the freedom of the press -- or if they're brought down by hackers as was demonstrated today -- you can still use the IP address to reach us.
If NaturalNews.com appears to be unreachable during a crisis event, revert to using the numbers instead of the name, and the site will likely respond.
An even better way: Subscribe to our email newsletter
An even better way to make sure you can hear from us is to subscribe to our FREE email newsletter (see subscription form below).Email is virtually impossible for anyone to block
. Unless there's a nuclear holocaust or something, we will always be able to email you with the latest alerts and information, even if our web servers are hacked or physically taken offline.
Even if you don't want to read our email newsletter each day, simply staying subscribed is valuable because we will be able to reach you with urgent alerts
about what's really happening.
We don't sell email addresses to anyone. Your privacy is completely protected, and you can unsubscribe at any time. Subscribing to our email newsletter is your way of allowing us to reach you even in a crisis, a seizure, or a hack attack.
Subscribe now using the form below: