WikiLeaks has returned online after absorbing punishing distributed denial-of-service (DDoS) attacks for nine straight days.
The attacks came at a particularly inopportune time for the news organisation, which recently published a new batch of emails detailing a wide-ranging government surveillance program known as TrapWire.
Millions of emails were handed over to WikiLeaks earlier this year after online activist collective Anonymous last December hacked global intelligence firm Stratfor.
A group calling itself AntiLeaks has taken credit for the DDoS attacks. It claims to have launched out of opposition for WikiLeaks leader Julian Assange seeking political asylum in Ecuador.
Accessibility to WikiLeaks.org appeared to immediately return after it signed up Monday afternoon for services with CloudFlare, a San Francisco start-up.
Prince in June described CloudFlare as a "giant reverse proxy" that relies on more than 20 data centers across the world. Traffic to its customers' websites first past through the CloudFlare network before directing to the origin server.
"And we can clean and accelerate that traffic as it passes through, so that if a hacker is trying to hack your site, they actually get stopped by us at the edge of our network and it never gets to your data center, making sure you're as fast and safe as possible," he said.
"Is that all you got?" WikiLeaks tweeted Monday. "Keep attacking. Our skin just gets harder."
This article originally appeared at scmagazineus.com
Copyright © SC Magazine, US edition
Issue: 336 | March 2015
Access CRN's extensive online resources including; email bulletins, community discussions and unique online news.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can log on to the CRN website or start posting comments on articles.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain '@crn.com.au' to your white-listed senders.