Mixter
Computer security specialist
title: "Mixter" type: doc version: 1 created: 2026-02-28 author: "Wikipedia contributors" status: active scope: public tags: ["computer-security-specialists", "living-people", "year-of-birth-missing-(living-people)", "cult-of-the-dead-cow-members"] description: "Computer security specialist" topic_path: "technology/computing" source: "https://en.wikipedia.org/wiki/Mixter" license: "CC BY-SA 4.0" wikipedia_page_id: 0 wikipedia_revision_id: 0
::summary Computer security specialist ::
Mixter is a computer security specialist. Mixter first made the transition out of the computer underground into large-scale public awareness, in 2000, at which time newspapers and magazines worldwide mentioned a link to massively destructive and effective distributed denial of service (DDoS) attacks which crippled and shut down major websites (including Yahoo!, Buy.com, eBay, Amazon, E-Trade, MSN.com, Dell, ZDNet and CNN). Early reports stated that the FBI-led National Infrastructure Protection Center (NIPC) was questioning Mixter regarding a tool called Stacheldraht (Barbed Wire). Although Mixter himself was not a suspect, his tool, the Tribe Flood Network (TFN) and an update called TFN2K were ultimately discovered as being the ones used in the attacks, causing an estimated $1.7 billion USD in damages.
In 2002 Mixter returned to the public eye, as the author of Hacktivismo's Six/Four System. The Six/Four System is a censorship resistant network proxy. It works by using "trusted peers" to relay network connections over SSL encrypted links. As an example, the distribution includes a program which will act as a web proxy, but all of the connections will be hidden until they reach the far end trusted peer.
References
References
- "[https://news.bbc.co.uk/2/hi/science/nature/641921.stm Hacker inquiry leads to Germany]", ''[[BBC News Online]]'', February 13, 2000.
- [http://staff.washington.edu/dittrich/misc/tfn.analysis The "Tribe Flood Network" distributed denial of service attack tool, An Analysis] David Dittrich, University of Washington, 1999
- Lemos, Robert. "[http://news.zdnet.com/2100-9595_22-518461.html Author of Web Attack Tool speaks] {{Webarchive. link. (2007-08-11 ", ''[[ZDNet]]'' news, February 9, 2000.)
- Wallack, Todd. "[http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2000/02/15/BU31981.DTL Probe Focuses on Prime Hacking Suspects - Investigation hampered by bogus attack bragging]," ''[[San Francisco Chronicle]]'', February 15, 2000.
- "[https://news.bbc.co.uk/1/hi/sci/tech/1541252.stm 'Mafiaboy' hacker jailed]", ''[[BBC]]'' news, September 13, 2001.
- Schachtman, Noah. "[https://www.wired.com/news/privacy/0,1848,53799,00.html A New Code for Anonymous Web Use]," ''[[Wired magazine. Wired]]'' online, July 12, 2000.
- "[https://www.chron.com/business/technology/article/Hackers-release-software-to-battle-censorship-2092948.php Hackers release software to battle censorship]," ''[[Houston Chronicle]]''/[[Reuters]], July 15, 2002.
- "[https://www.cbsnews.com/news/hackers-take-aim/ Hackers Take Aim]" ''[[CBS News]]'', July 15, 2002.
- Mixter. "Six/Four System Protocol Specs," 2003. mixter@hacktivismo.com.
- Mixter. "The Six/Four System; A Decentralized Anonymous Peer-To-Peer Network Infrastructure With Trust," README file in Six/Four distribution, 2003.
::callout[type=info title="Wikipedia Source"] This article was imported from Wikipedia and is available under the Creative Commons Attribution-ShareAlike 4.0 License. Content has been adapted to SurfDoc format. Original contributors can be found on the article history page. ::