The site is still accessible by mirrors on its IP ranges - e.g: http://220.127.116.11/EveryDNS
is a free DNS provider. It's used by people who, for one reason or another, do not wish to run their own DNS servers. Elliquiy used them for awhile until I moved my domains to Namecheap, which provides its own service. I've been thinking of setting up some domains on DNS Made Easy to speed up access times and make the sites more robust, but they're for pay and money is tight.
I'm rather surprised that Wikileaks was using them. If Assange is setting up servers all over, he should at least have a fairly robust DNS package.
DNS is easily the most vulnerable portion of the Internet, as a rule. While pretty much any other sort of DDOS attack can be mitigated, DNS reflection attacks are one of the flaws that everyone knows about but no serious effort so far has been made to correct.
I've mentioned the possibility of an alternative DNS root before - and possibly an alternative DNS system. This sort of thing gives Wikileaks and others common cause with Peter Sunde
about building a new DNS system.
This could prove rather interesting, as the threat of a DNS-based DDOS looms over everyone's head, for the most part. At least until you get to the top 20-30 sites, anyway. This means Elliquiy, too, so a system that could prevent this - even if it was only for those users who cared to implement it - would be very attractive.