A typical assault against sites and web-enabled techniques has been to storm the resources of those resources with fake customers since the dawn of the Internet. Not necessarily harmful traffic, since one of the first attempts was to simply set up a small program that would attempt to establish an HTTP connection with the precise web server repeatedly and as quickly as the attacker’s small bits could. The precise system had been paralyzed, blocked, or also brought down if enough of the link requests were entirely commonplace requests for a web page.
Advertisement
You might not actually realize you were being attacked. A big gadget retailer’s brand-new e-commerce website received a sizable media buy for Thanksgiving Day among the soccer games without actually speaking with the technical staff in a prominent early internet disaster. Every North American mom and grandmother made the decision to start their Christmas shopping earlier than their father and boys, and the incredibly underfunded site Titanic was playing.
When it’s done intentionally, it’s called a denial of service harm.  ,
In the future, the technology will get better and web systems will have methods for shedding extra load, but then the hackers in black hats started making malicious bots that could be installed covertly and carried out attacks on hundreds or thousands of computers simultaneously, giving us a distributed denial of service ( DDoS ) attack.
Suddenly, technology was invented to deal with it. Services like Cloudflare then prevent DDoS attacks using cutting-edge systems. ( Of course, Cloudflare managed to turn its sophisticated technology into a DDoS attack, but that’s a story for another time. )
The problem is that every denial of service attack depends on the volume of virtual ports needed for a internet connection, the web server program’s limitations, and the processing power that service requests have available. With enough desire, any minimal services may grind to a halt.
Advertisement
And then we come to the vote.
I first came across this when I read that 90, 000 voting registrations were received in Maricopa County, Arizona on the last day they could be taken into consideration. That’s a lot of aspects to be processed, and they all evidently came in mass from a few options. It meant a huge demand on the services of the County Registrar, and then it turns out 40, 000 were damaged in some way — torn, liquid damaged, a bunch of stuff. Naturally, broken registrations must be processed in some way, and a good-faith work to approach a faulty form requires more time and effort than a clean one.
In other words, it was an attempt to destroy a minimal tool.
A number of Pennsylvania regions had several irregularities, from false licenses to vote judges “accidentally” showing up late, to resources “accidentally” never getting to the voting position, to Republican poll watchers being denied entry.  ,
( I was a Republican election judge in Pueblo, Colo., at a time when the Democrats ‘ machine made Pueblo known as” Little Chicago”, but they never tried to actually exclude Republican poll watchers. )
In every situation, we’re seeing some important rescue being limited or denied.
Advertisement
It’s easy to come up with complex theories to discuss this, but I suspect what we’re actually seeing is a bunch of persons, more or less freely, deciding to” keep politics” by keeping it from working.
I believe the election is the subject of a huge and dispersed denial of service attack.