Two Weeks Of DDOS Attacks - Did We Survive?

แชร์
ฝัง

ความคิดเห็น • 155

  • @t3dotgg
    @t3dotgg  ปีที่แล้ว +49

    CHECK OUT VERCEL AND UPSTASH BECAUSE THEY KEPT US ALIVE THROUGHOUT THIS
    vercel.com/?ref=theo
    upstash.com/?

    • @dasrite
      @dasrite ปีที่แล้ว +2

      Am i correct in presuming the only reason you're not gonna be billed for this is because you're sponsored? So if it was me i'd be getting billed for a DDOS attack? that's enough of a yikes for me tbh lol i'd rather it crash than it staying up and them charging me tenfold lol

    • @t3dotgg
      @t3dotgg  ปีที่แล้ว +1

      @@dasrite no, they would help any customers going through this

  • @T42nk
    @T42nk ปีที่แล้ว +14

    You should make a dedicated video about DDoS-protection on the T3 stack, as clearly there is a possibility of creating unreasonable cost for the service provider and not everyone will have their bill refunded. You mention as a side note that you could put rate limiting on each route for a personal CloudFlare, maybe you expand on that and/or provide a package as framework for that.

  • @somedick7337
    @somedick7337 ปีที่แล้ว +22

    We had a DDoS attack about a year ago where it was about ~10TB/minute and we are hosted behind cloudflare, so just couple clicks inside cloudflare panel (there is a button "we are under attack") and this attack is gone, next minute I checked where is it comes from and every single IP of attack came from outside of my country (No one wants to ddos from same country or your business since police could investigate it and attacker could end up in jail), so I did just enabled captcha for any request form outside of my country (since our business doesnt have international customers) and disabled "we are under attack" and never had an issues since then while they still trying (one year later). So may be something like cloudflare could help you.

  • @Hexalyse
    @Hexalyse ปีที่แล้ว +112

    Either they bought botnet time and it costed them money directly; or they used their own botnet (instead of renting it to other people during this time), and that's money they could have earned but didn't. So the result is the same : it cost them money. Probably a decent amount.
    Which I find hilarious considering the ridiculous impact they had.

    • @sardines7436
      @sardines7436 ปีที่แล้ว +13

      not to mention theyre giving him monetizable content lol. from his pockets to theo’s

    • @Hexalyse
      @Hexalyse ปีที่แล้ว +17

      @@sardines7436 and good publicity for Vervel too, seeing how easy it was to handle the problem with them.
      Conspiracy theory plot twist : it's actually Vercel themselves who conducted the attack so that Theo make this video to further PR their services to his followers, for free.

    • @Manas-co8wl
      @Manas-co8wl ปีที่แล้ว +4

      @@Hexalyse i'm glad i'm not the only paranoid one who thought of this. i even went a step further..

    • @jordixboy
      @jordixboy ปีที่แล้ว

      he gain internet fame thats better than money

    • @sajanah1253
      @sajanah1253 ปีที่แล้ว

      Just curious, how much it could have cost for this attack?

  • @sebaarnio
    @sebaarnio ปีที่แล้ว +31

    This happened to me too! It might not have been targeted towards you because it happened to a test deployment of mine which didn't even have any real traffic. It was also on Vercel, and I get blocked pretty quickly (although support helped me get unblocked)
    Edit: My attack caused 462 GB-Hrs within like 20 minutes

  • @emanuelfarauanu1760
    @emanuelfarauanu1760 ปีที่แล้ว +287

    Who has that much time to waste on a DDOS attack that gains them absolutely no benefits? It's clear that your tech stack handled the attack quite well, it didn't even cost you much at all. If you get enough views you'll probably even get money out of this video that they helped create. Someone really hated you, lol.

    • @NihongoWakannai
      @NihongoWakannai ปีที่แล้ว +26

      For some reason there are random tech nerds who REALLY love to die over tiny molehills for no reason

    • @augustoeduardo209
      @augustoeduardo209 ปีที่แล้ว +3

      cant understand why someone waste his time to do that....

    • @josemfcheo
      @josemfcheo ปีที่แล้ว +19

      Maybe written in Rust...

    • @brahimbenfares1464
      @brahimbenfares1464 ปีที่แล้ว +11

      Apparently aws didn't like that video lol

    • @milanpatel3159
      @milanpatel3159 ปีที่แล้ว +12

      @@josemfcheo beware of usage of that word bro 😂 (the R word)

  • @EddyVinck
    @EddyVinck ปีที่แล้ว +57

    This video got hundreds of hits in the first few minutes. Maybe your TH-cam is getting DDOS’d 😮

    • @emanuelfarauanu1760
      @emanuelfarauanu1760 ปีที่แล้ว +1

      TH-cam alg really loved this video, it showed it to me in the recommendations the minute it was published. That was with me not watching many of the previous videos.

  • @ludawig_
    @ludawig_ ปีที่แล้ว +15

    I am glad that there is an official report, from the DDOS Foundation, on this incident and that Theo is now a part of it! 👍😉

  • @TheJulsMan
    @TheJulsMan ปีที่แล้ว +15

    You got lucky because you are publicly sponsored ... but this brings up a BIGGER point. When you pay for metered services, the providers NEED to indemnify you against DDOS attacks or other potentially ruinous events. This could be a huge selling point, because not all services have built in caps. As a matter of experience, I witnessed a peer who used AWS, his application while still in beta had a memory leak and AWS sent him a $13k bill. Insane! Risk avoidance is important to any business especially if there is no ceiling or price cap. As someone who uses these services this keeps me up at night.

  • @datainsight1724
    @datainsight1724 ปีที่แล้ว +9

    Did Vercel give more details? Such as if the IP addresses were all from the same IP block or dispersed across many, whether or not they were residential IPs, their own IPs, IPs from other cloud providers, etc, geolocation lookups of the IPs? All of this seems like it would be super useful to know about to prevent future attacks both for you and them

    • @bluesteelbass
      @bluesteelbass ปีที่แล้ว

      Willing to bet those IP addresses got put on one of the many naughty lists that are distributed to rulesets for firewalls.

  • @williamx0
    @williamx0 ปีที่แล้ว +6

    The key is that you need to rate limit these attacks whether you use server or serverless. So this demonstrates serverless has tools to handle it. Ofc if you had a server and rate limited it could handle it too. Re one of your last statements, it doesn’t mean servers would’ve been worse. It means not rate limiting would’ve been bad, server or serverless

  • @jocdiazm
    @jocdiazm ปีที่แล้ว +1

    Love that the stack you are recommending is the one that you use for your stuff.
    I can imagine that the people behind this were just absurdly annoyed that you are recommending tools that don't fit their certificates or what they consider is the "right move".

  • @lev2590
    @lev2590 ปีที่แล้ว +12

    Considering that one 10gbit server can (in theory) handle 1.5tb raw traffic (in 20min) I don't believe that this was a big DDOS attack. Also I believe that having multiple cheap vps with high bandwith automatically deployed when needed, would be probably way cheaper than vercel.
    Obv. the developer experience will be worse, especially when setting all the servers up or other cluster related issues occure.

    • @perc-ai
      @perc-ai ปีที่แล้ว

      Yes this was just 15 yr old some kid with a very small botnet. A pro would have used 10k IPs and Vercel would have to shutdown their dns for a period of time

  • @Shri
    @Shri ปีที่แล้ว +7

    It is actually really cheap to buy residential proxies (pools with millions of IP addresses) and then use them to bombard requests to services. These residential proxies exist to enable scraping of SERP content as well as regular sites with hardened DDOS protections. Some residential proxy services also bypass recaptchas (using AI and sometimes even humans) for premium. Residential proxies have legitimate use cases but can be misused to create botnets too. That is what I am suspecting is happening here. They haven't actually paid for those 600 IPs. Rather, they are tapping into a pool of million IPs provided by residential proxy services.

    • @NiSiRewinD
      @NiSiRewinD ปีที่แล้ว +2

      It's free, even on that scale. There are a ton of private projects for geting around state cencorship, x100.000 of IPs, since the Ukraine war shined a light on how those countries block access to Tor itself. No idea how big those requests were, but generating a couple Gbps traffic is still negible, as far as paid botnets would go. Those networks typically limit access to specific websites, but I guess it wouldn't be crazy to get around that, as user, depending on how they filter. I suspect this didn't run via Tor, but I guess we would with a list of the IPs

  • @dandogamer
    @dandogamer ปีที่แล้ว +74

    If you weren't on the pro license and sponsored by vercel this might have been a different story. I can imagine a normal person would have to suck up the big fees or take down their application

    • @mormantu8561
      @mormantu8561 ปีที่แล้ว +21

      It depends. Cloud providers more commonly than you might think cover ridiculous fees in case of an error or attack like this. Because they don't want to lose your business.

    • @Knightfall23
      @Knightfall23 ปีที่แล้ว +8

      They’ll most likely cover it the first time but if it happens again your on the hook

    • @mormantu8561
      @mormantu8561 ปีที่แล้ว +2

      @@Knightfall23 Agreed.

    • @dasrite
      @dasrite ปีที่แล้ว +6

      @@Knightfall23 I'd rather get a straight response from Vercel directly than try to imagine what might happen

    • @samdcbu
      @samdcbu ปีที่แล้ว

      If you are a normal user on the free tier of vercel you would just put your application behind Cloudflare for free and let them handle the DDoS traffic.

  • @TheGetawayMan
    @TheGetawayMan ปีที่แล้ว +1

    Side note - The vid I'm most looking forward to is the one you mentioned about syncing clerk with your own db 🙂

  • @hanes2
    @hanes2 ปีที่แล้ว +4

    I think both CloudFlare and Linode (Akamai CDN) has ddos protection included.

  • @hhhhhhhhhhhhhhhhhhhhhh
    @hhhhhhhhhhhhhhhhhhhhhh ปีที่แล้ว +11

    This was not even that big of an attack. The traffic is literally less than 1 GB per second. If anything this was a skid attack which is further supported by them literally just loading one JS file over and over. This wasn't a DDOS attack, this was some kid trying out their $5 booter.

    • @OfoeNelson
      @OfoeNelson ปีที่แล้ว

      So this is not on the same level as the ddos attack that took down google

  • @benheidemann3836
    @benheidemann3836 ปีที่แล้ว

    Love it, keep them coming

  • @AJ-wf1vh
    @AJ-wf1vh ปีที่แล้ว +17

    huh, so vercel has no rate limitting by default? I would have expected a managed service to handle this, not have me set up my own edge middle ware (upstash?)
    It doesn't look good on their part

  • @canht95
    @canht95 ปีที่แล้ว +4

    It was probably @theprimeagen...

  • @alitonoliveira1700
    @alitonoliveira1700 ปีที่แล้ว +10

    It would be great to know how to prevent a DDOS attack against AWS and GCP (Cloud Run and Cloud Functions).

    • @QckSGaming
      @QckSGaming ปีที่แล้ว +3

      GCP: Toggle the DDOS shield on. Cloud Armor it was called I think.

  • @masseeerra
    @masseeerra ปีที่แล้ว

    Would be good to get an in depth video on the specifics of how you (or the tech) delt with it 🙏

  • @TheLKStar
    @TheLKStar ปีที่แล้ว +25

    I mean, having a punchable face and arrogant personality is bound to provoke someone when exposing yourself to thousands of strangers. Even so, it takes some extra thick emotional issues to waste any amount of time and resources to get revenge on a parasocial relationship.

  • @_va3y
    @_va3y ปีที่แล้ว +2

    >>> I think it’s quite impossible to take us down with this stack
    Bro, you’ve just broke the main rule of opsec 😅😅

  • @Daddyjs
    @Daddyjs หลายเดือนก่อน

    That would be an awesome tutorial setting up ddos protection using upstash

  • @CoderandFilmmaker
    @CoderandFilmmaker ปีที่แล้ว +10

    Honestly Theo, now I am very relaxed about the decision of using T3 Stack and the services you recommend us. If even Chirp handled this insanity! Then we’re in safe hands as Solo-preneurs 😊

  • @ilijanl
    @ilijanl ปีที่แล้ว +6

    Is it me, but why are they are targeting static assets? I mean if you want to increase Theo's bill, DDoS the api route which has the upstash rate limiter as well? It will cost him 0.20 cents - 0.40 cent per 100k request for upstash and probably far more for serverless/edge functions on vercel. Thus sending 100 milion request will at least cost 1000 * 0.20 + 500 GB hours ( 5*40) = 400 dollar + rest of vercel

    • @perc-ai
      @perc-ai ปีที่แล้ว

      Tbh this attack probably came from a 15 yr old… this is not a serious attack tbh it’s very easy to rotate 10k residential proxies and force vercel to temporarily shutdown all ping services I could probably do it

  • @stevenismart
    @stevenismart ปีที่แล้ว +2

    Can you do a more in depth video on how to stop DDOS and other random attacks?

  • @socialkruption
    @socialkruption ปีที่แล้ว +8

    Wouldn't surprise me if some from /g/ were part of this, your videos have started making thier rounds over on the board.

    • @t3dotgg
      @t3dotgg  ปีที่แล้ว +5

      Oh really? Fuck yeah finally they're gonna HATE my ass

    • @hyper_channel
      @hyper_channel ปีที่แล้ว +6

      /g/ cares about nothing but LLMs right now, highly unlikely

    • @varma8669
      @varma8669 ปีที่แล้ว +2

      What is /g/?

    • @hyper_channel
      @hyper_channel ปีที่แล้ว +6

      @@varma8669 4chan's technology board

    • @g-rexsaurus794
      @g-rexsaurus794 ปีที่แล้ว

      LLM?

  • @Fervore_
    @Fervore_ ปีที่แล้ว +5

    at what point does vercel consider the requests as a ddos attack do they use any tools? what happens if a tiny dev's app gets ddossed, would vercel refund 100% of the money by all requests that day? how long do they take to answer from the point where you're under attack to when the situation gets resolved?

    • @nickwoodward819
      @nickwoodward819 2 หลายเดือนก่อน

      after 1 minute according to their webpage. not great really given the number of requests you could be on the hook for at that point. and no, if they don't say they'll refund your money, assume they won't.

  • @ZukoThePrince
    @ZukoThePrince ปีที่แล้ว +1

    your hair looks majestic dude !!!

  • @markclynch
    @markclynch ปีที่แล้ว +17

    It's laughable how much the attacker likely spent vs what you incurred. Perfect example of mitigation, you can't stop it from happening, you have to make it too expensive for bad actors to continue.

    • @name_less227
      @name_less227 ปีที่แล้ว

      Don’t these type of attacks usually use hacked computers to help them attack?

    • @Hexalyse
      @Hexalyse ปีที่แล้ว +1

      @@name_less227 They do. It might not "cost" them anything in the literal sense. They didn't spend money most probably, if they own the botnet. BUT... usually when you own such a botnet, you can sell it, or rather rent it to people who want to conduct such attacks. So all in all, either their bought botnet time and is cost them money directly; or they used their own botnet instead of renting it, and that's money they could have earned but didn't. So the result is the same : attacking cost them money. Which I find hilarious considering the ridiculous impact they had.

    • @jason_v12345
      @jason_v12345 ปีที่แล้ว +2

      But you can stop it from happening. Rate limiting middleware can be written in a just a few lines of code.

    • @perc-ai
      @perc-ai ปีที่แล้ว

      @@jason_v12345 Theo doesn’t even know what he is doing lol

  • @lightninginmyhands4878
    @lightninginmyhands4878 ปีที่แล้ว +1

    Where is redis in your data fetching flow?

  • @Mitsunee_
    @Mitsunee_ ปีที่แล้ว +2

    if you're putting the upstash ratelimiter infront of everything, how are you not hitting ratelimits on upstash?

  • @eleldevelop-bu2md
    @eleldevelop-bu2md ปีที่แล้ว +7

    Can someone describe the AWS scenario? What would have happened and how to do rate limiting?

  • @dhkatz_
    @dhkatz_ ปีที่แล้ว +1

    Can you not put a Vercel site behind a Cloudflare proxy?

  • @yunyang6267
    @yunyang6267 11 หลายเดือนก่อน +1

    I have a question. Are those people generating these attacks going to be held accountable or there are ways to generate botnets attack and get away with it

  • @maddsua
    @maddsua ปีที่แล้ว +1

    Yep, serverless rocks. Won't ever go back to dedicated hardware

  • @lescobrandon2202
    @lescobrandon2202 ปีที่แล้ว +1

    Good stuff.

  • @udaym4204
    @udaym4204 3 หลายเดือนก่อน

    upstash rate limit is good for backend but what about fronted to save from ddos attack

  • @rifwann
    @rifwann ปีที่แล้ว

    dude, im sold on this platform you are using.. what a way to advertise..

  • @pedrofelipefonsecaenunes2435
    @pedrofelipefonsecaenunes2435 ปีที่แล้ว

    This won me over!

  • @mike110111
    @mike110111 ปีที่แล้ว +1

    How much would it have cost? Isn’t the point they were making is that on demand computing can make your costs sky rocket?

  • @gemmaatroxxibox5322
    @gemmaatroxxibox5322 6 หลายเดือนก่อน

    DDOS is my main concern with Serverless. With an nginx proxy you can get sub 1ms 503 responses in a DDOS and cap the number of requests per IP so that it doesn't touch your actual app code when it happens. So for a free or cheap server vs a Serverless platform, at least getting started out, I know someone can't rack up costs for me.

  • @thejonte
    @thejonte ปีที่แล้ว +1

    Wow! Holy crap!

  • @user-tz6nn8iw9m
    @user-tz6nn8iw9m ปีที่แล้ว +2

    ddos a static file :genius:

  • @codebelb4767
    @codebelb4767 ปีที่แล้ว +1

    Jeff Bezos hired DDOS assassins to protect his stack

  • @brod515
    @brod515 ปีที่แล้ว +1

    I can't imagine that someone decided to waste any significant ammount of money doing this. I'm wondering how they had access to 600 static ip addresses.

  • @Rensoku611
    @Rensoku611 ปีที่แล้ว +4

    6:09 I dont understand this part. Why would you fare worse if you had actual servers? They have rate limiting and IP blacklisting as well

    • @jacoblockwood4034
      @jacoblockwood4034 ปีที่แล้ว +1

      I think he’s saying that if they were hitting the actual servers, all the endpoints would be destroyed pretty quickly

  • @jmarbutt23
    @jmarbutt23 ปีที่แล้ว

    Where is your video on the rate limiting with UpStash?

  • @jventura1738
    @jventura1738 ปีที่แล้ว +1

    Theo makes a video about Twitch dying then gets DDOS’d hmmm… 😂 all jokes aside your services handled well!

  • @betterinbooks
    @betterinbooks ปีที่แล้ว +2

    this is a pretty cool vercel ad to be honest.

  • @dueft4479
    @dueft4479 ปีที่แล้ว +1

    How much did it actually cost you?

  • @SeanCassiere
    @SeanCassiere ปีที่แล้ว +3

    Does anyone have any examples of using upstash's rate-limiter with tRPC?
    Been using it more, and I haven't really gotten around the concept of how rate-limiting could be added to it. It most likely would be done via a middleware, but just putting up the flag for any existing repos that have it.

    • @liam.brewer
      @liam.brewer ปีที่แล้ว +2

      he covers it in his newest t3 stack course where he builds a twitter clone called chirp

    • @SeanCassiere
      @SeanCassiere ปีที่แล้ว

      @@liam.brewer thanks!
      My bad for not fully checking the repo.

  • @sortof3337
    @sortof3337 ปีที่แล้ว

    What do you think about IP based rate limiters? Would they prevent such attacks? That's the only protection I have against DDOs.

    • @ttrss
      @ttrss ปีที่แล้ว

      ddos atks are (Distributed)DOS

    • @sortof3337
      @sortof3337 ปีที่แล้ว

      @@ttrss so its like wearing a hat to be bulletproof. Nice.

    • @ttrss
      @ttrss ปีที่แล้ว

      @Sort of 😄i guess. And then cloudflare protection is like letting a government protect you, but they're like super authoritarian.

  • @andriiantoniuk8419
    @andriiantoniuk8419 ปีที่แล้ว

    But, what exact cost for you of this DDOS attack?

  • @marcelor1235
    @marcelor1235 ปีที่แล้ว

    What contents do you have about Vercel?
    I guess we all have some app to protect.

  • @hseinb
    @hseinb ปีที่แล้ว +2

    How do you know the attackers have used static IP addresses?

    • @filda2005
      @filda2005 ปีที่แล้ว +1

      if it did not chang within 2weeks, it is not so much dynamic IP

  • @Joseleon-ct8xz
    @Joseleon-ct8xz ปีที่แล้ว +1

    it migth be done from the rust foundation

  • @sandrinjoy
    @sandrinjoy ปีที่แล้ว

    we got ddosed, and vercel did nothing. 6.8TB

  • @xavhow
    @xavhow ปีที่แล้ว +2

    Just wondering why it’s costing the attacker more? The hundreds of IPs used by the botnet are probably someone else’s.

  • @shahkaleem6601
    @shahkaleem6601 ปีที่แล้ว

    Because you were Ddosed you have got a subscriber.

  • @mike110111
    @mike110111 ปีที่แล้ว

    Would a simple solution be - count how many requests for each IP address, and if it goes above 100 per second you block them?

  • @foswa6335
    @foswa6335 ปีที่แล้ว

    Theo what are these thumbnails 😂

  • @greendsnow
    @greendsnow ปีที่แล้ว

    1400 GB costs USD 180 on Vercel. (First 1000 is USD 20)
    What're you talking about?!

  • @just_ppe
    @just_ppe ปีที่แล้ว +2

    Nice promotional video :-)

  • @MrLT-vf3wr
    @MrLT-vf3wr ปีที่แล้ว

    Who has the resources to pull this off? Amazon does, that's who...

  • @jbbzzi
    @jbbzzi ปีที่แล้ว +1

    Absolutely hilarious that some people will spend thousands out of pure spite for absolutely nothing. Still, I can't help but be skeptical of these new cloud providers you're showcasing. When the 'growth' period ends and the 'taking profits' period begins, is it still going to be more attractive than AWS? We'll see!

  • @JuanRodriguez-rh4kp
    @JuanRodriguez-rh4kp ปีที่แล้ว

    It was probably the angular team trying to make t3 look bad.

  • @GeorgeDicu-hs5yp
    @GeorgeDicu-hs5yp ปีที่แล้ว

    Oh nice!! Long live rate limiting.

  • @nicolasguillenc
    @nicolasguillenc ปีที่แล้ว

    People can be nasty, that’s why it’s better sometimes to build in private. Oh and good for you man the infrastructure really held up

  • @Knightfall23
    @Knightfall23 ปีที่แล้ว

    Gotcha

  • @rizkiaprita
    @rizkiaprita ปีที่แล้ว +1

    i see what you did there

  • @anasouardini
    @anasouardini ปีที่แล้ว

    Instead of bringing down your services, they just gave you a topic to talk about? hilarious!!

  • @dog4ik
    @dog4ik ปีที่แล้ว +3

    Must be rust foundation

  • @Daddyjs
    @Daddyjs หลายเดือนก่อน

    How would you be dead if you had actual servers running this? Wouldnt it be better because then you wont get charged a lot of money? Thanks for helping a newb like me understand

  • @FaisalAfroz
    @FaisalAfroz ปีที่แล้ว +2

    introducing captchas might also help.

    • @t3dotgg
      @t3dotgg  ปีที่แล้ว +6

      For fetching a JS file?

  • @Khari99
    @Khari99 ปีที่แล้ว +1

    Well you sold me on Vercel thats for sure.

  • @venicebeachsurfer
    @venicebeachsurfer ปีที่แล้ว

    Did Vercel try to charge you?

  • @spectator5144
    @spectator5144 ปีที่แล้ว +2

    Vercel needs bun

  • @TomNook.
    @TomNook. ปีที่แล้ว +2

    Primeagen testing out his Rust pen test code?

  • @justmrmendez
    @justmrmendez ปีที่แล้ว +1

    "impossible to take down our services" my guy, you are challenging the wrong community here 😂, and for those that say it cost them money, ego doesn't care about money. We do things some time just to prove that we can, no need to hate you to do something like this (I'm not saying I'm even capable of this), but if i could, i wouldn't do it because hate, but ego or passion, and seems you already have enough of both

  • @JasonJA88
    @JasonJA88 11 หลายเดือนก่อน

    👍

  • @humansaremortal3803
    @humansaremortal3803 ปีที่แล้ว +1

    If the haters attack again, please have a bowtie for the next vid.

  • @riolly
    @riolly ปีที่แล้ว

    I thought hacker is always smart, they absolutely stupid in this case.

  • @RockRespawn
    @RockRespawn ปีที่แล้ว

    oof

  • @headlights-go-up
    @headlights-go-up ปีที่แล้ว +2

    Considering how much this cost the attackers and how little it affected you, it had to be someone with disposable income.
    Seems like Elon wants to get his revenge after you told him how ads work.

  • @aryabp
    @aryabp ปีที่แล้ว +20

    Seems someone's back-end needs Rust Framework 😊
    Edit: idk why my reply multiple times got deleted. so i am sorry, i cant explain due to no freedom of speech

    • @IvanRandomDude
      @IvanRandomDude ปีที่แล้ว +5

      explain

    • @NorthernChimp
      @NorthernChimp ปีที่แล้ว

      @@IvanRandomDude hint: th-cam.com/video/2oh7MoEvJ88/w-d-xo.html

    • @alessandrosomigli
      @alessandrosomigli ปีที่แล้ว +6

      This really just shows that TS on the backend can handle this kind of load as well most of the time...

    • @t3dotgg
      @t3dotgg  ปีที่แล้ว +18

      Comments like this are why it's hard for me to give a crap about Rust tbh - like it's obvious it wouldn't have helped here at all

    • @christophersherman8036
      @christophersherman8036 ปีที่แล้ว +2

      Hope this comment is ironic lol

  • @bobanmilisavljevic7857
    @bobanmilisavljevic7857 ปีที่แล้ว

    Haters are just mad you can beat them in games of skate and they are mongo

  • @windyace
    @windyace ปีที่แล้ว

    lmao they literally gave you content

  • @videos40058
    @videos40058 10 หลายเดือนก่อน

    no they didnt burned 500 slots. you burned yourself 500 slots and from all that who knows how many of them was players:))