Margaret Rouse is an award-winning technical writer and teacher known for her ability to explain complex technical subjects simply to a non-technical, business audience. Over…
A virtual sit-in is a type of electronic civil disobedience (ECD) where activists and protesters voice their opinions by simultaneously accessing a website multiple times, creating disruption of the target website. The term name is derived from the popular non-violent form of protests popular during the Civil Rights Movement in the United States during the 1950s and 1960s.
A virtual sit-in is also known as a virtual blockade.
A virtual sit-in is geared toward slowing down a target website or even crashing it completely, thereby preventing access by regular users. It is meant to recreate the type of public disruptions caused by actual sit-ins in public areas through occupying and effectively preventing proper operations. However, this is difficult to accomplish because of technological advancements and increased Web server capabilities.
For example, in a real world sit-in, protesters may go to a coffee shop and order the cheapest item on the menu and sit in the shop for hours or days until they are forced to leave, thereby undermining service to other customers, causing the shop to lose money and customers for the protest’s duration. A virtual sit-in can occur in any public location or event, like a street, library or meeting.
A virtual sit-in is actually a distributed denial of service (DDoS) attack but far less harmful in application, as modern Web resources are more than capable of handling large amounts of traffic. It would take thousands or millions of coordinated individuals to participate in a virtual sit-in before its effect would be akin to that of an actual DDoS attack involving botnets and automation.
Techopedia’s editorial policy is centered on delivering thoroughly researched, accurate, and unbiased content. We uphold strict sourcing standards, and each page undergoes diligent review by our team of top technology experts and seasoned editors. This process ensures the integrity, relevance, and value of our content for our readers.
Margaret is an award-winning technical writer and teacher known for her ability to explain complex technical subjects to a non-technical business audience. Over the past twenty years, her IT definitions have been published by Que in an encyclopedia of technology terms and cited in articles by the New York Times, Time Magazine, USA Today, ZDNet, PC Magazine, and Discovery Magazine. She joined Techopedia in 2011. Margaret's idea of a fun day is helping IT and business professionals learn to speak each other’s highly specialized languages.
What are Tactics, Techniques, and Procedures (TTPs)? Tactics, techniques, and procedures (TTPs) are the strategic plans, methodologies, and actions an...
Margaret RouseTechnology Expert
What is AI Jacking? AI jacking is a new cybersecurity term that explains a specific kind of cyberattack targeting artificial...
Maria WebbTechnology journalist
What is a QR Code Phishing? QR code phishing, also known as quishing, is a type of cyberattack that involves...
Trending NewsLatest GuidesReviewsTerm of the Day