Re: [Webinar] Decrypting the WannaCry ransomware: Why is it happening and (how) is it going to end?
On Wed, May 17, 2017 at 8:10 PM, Nancy Quiros <quiros@isoc.org> wrote:
Hi ,
The webinar tends to make an analysis of the main technological, geopolitical, legal, and economic aspects of the ransomware. Experts from different fields will discuss why ransomware has become a major issue: Can such attacks be prevented by technological measures alone? Is there a need for a legal response, such as Microsoft’s proposal for the Digital Geneva Convention? Is raising more awareness among users the ultimate solution?
The webinar will discuss whether it is possible to put a stop to malicious software, or whether they should be considered the price we have to pay for the many advantages of the Internet. Choices on policy will have to be made sooner rather than later. The aim of the discussion is to explore and help make informed policy choices.
----- Nancy Quiros Development Manager LAC Chapters
Thank you for the clarification, Nancy! Very much appreciated! <3 Ceci :)
On 05/17/2017 07:25 PM, Cecilia Tanaka wrote:
The webinar tends to make an analysis of the main technological, geopolitical, legal, and economic aspects of the ransomware. Experts from different fields will discuss why ransomware has become a major issue: Can such attacks be prevented by technological measures alone? Is there a need for a legal response, such as Microsoft’s proposal for the Digital Geneva Convention? Is raising more awareness among users the ultimate solution?
The webinar will discuss whether it is possible to put a stop to malicious software, or whether they should be considered the price we have to pay for the many advantages of the Internet. Choices on policy will have to be made sooner rather than later. The aim of the discussion is to explore and help make informed policy choices.
----- Nancy Quiros Development Manager LAC Chapters
Thank you for the clarification, Nancy! Very much appreciated! <3
*sigh* The question "Can such attacks be prevented by technological measures alone" has a very simple answer: Yes. Just stop using Microsoft operating systems and the problem goes away. Microsoft could fix their horribly broken product any time, but they never will: Maintaining the highest rates of failure, repair and replacement the market will bear creates a large revenue stream that would not otherwise exist. Security failure is the best approach: Loyal Microsoft customers attribute the damage done to malicious third parties, and the process of repairing that damage creates a multi-million dollar bump in annual sales for Microsoft. There will always be "security issues" in networked computing. But at least 95% of real world lost time and lost data incidents observed today have a single and easily remedied cause: Microsoft. Mr. Miyagi say, "Best block is no be there." In the case at hand, that's the only block that really works. Microsoft security fail imposes either a large amount of busy work and extra costs on the user, or exposes the user to unacceptable risks. That's a lose/lose situation, whether one is a Security Guru or clueless user. Now let's see who jumps in to defend Microsoft: There's always somebody out there who believes that "stupid people get what they deserve" and makes a business model out of that. :o/
On May 18, 2017, at 1:32 PM, Steve Kinney <admin@pilobilus.net> wrote:
On 05/17/2017 07:25 PM, Cecilia Tanaka wrote:
The webinar tends to make an analysis of the main technological, geopolitical, legal, and economic aspects of the ransomware. Experts from different fields will discuss why ransomware has become a major issue: Can such attacks be prevented by technological measures alone? Is there a need for a legal response, such as Microsoft’s proposal for the Digital Geneva Convention? Is raising more awareness among users the ultimate solution?
The webinar will discuss whether it is possible to put a stop to malicious software, or whether they should be considered the price we have to pay for the many advantages of the Internet. Choices on policy will have to be made sooner rather than later. The aim of the discussion is to explore and help make informed policy choices.
----- Nancy Quiros Development Manager LAC Chapters
Thank you for the clarification, Nancy! Very much appreciated! <3
*sigh*
The question "Can such attacks be prevented by technological measures alone" has a very simple answer: Yes. Just stop using Microsoft operating systems and the problem goes away.
Microsoft could fix their horribly broken product any time, but they never will: Maintaining the highest rates of failure, repair and replacement the market will bear creates a large revenue stream that would not otherwise exist. Security failure is the best approach: Loyal Microsoft customers attribute the damage done to malicious third parties, and the process of repairing that damage creates a multi-million dollar bump in annual sales for Microsoft.
There will always be "security issues" in networked computing. But at least 95% of real world lost time and lost data incidents observed today have a single and easily remedied cause: Microsoft.
Mr. Miyagi say, "Best block is no be there." In the case at hand, that's the only block that really works. Microsoft security fail imposes either a large amount of busy work and extra costs on the user, or exposes the user to unacceptable risks. That's a lose/lose situation, whether one is a Security Guru or clueless user.
Now let's see who jumps in to defend Microsoft: There's always somebody out there who believes that "stupid people get what they deserve" and makes a business model out of that.
:o/
Microsoft is ALWAYS what causes problems during pentest season.. fucking pass-the-hash, llmnr, and other broken by design protocols that have been giving script kiddies the SAME pivot points (and entry points!) for nearly 20 years...
I think whoever blasted this hack off may never touch their money. Apparently all the infections come with instructions for payment to be made to one of only three static wallets.. and everybody has their eyes on the block chain :P
There's enough cryptos, exchange points, tumblers and anon networks out there to make John Gotti rise up and dance a happy jig.
They've only brought in like $60k or something from 200k infections. Horrible return on infection ratio...
Until they daytrade it in cryptos for a year reaching $1M+. Move it out saying they kept no logs, pay their tax on $0 basis. Or keep and use it as crypto.
there many statists in the blockchain community
Really? Damn, who knew.
Any bets on whether ending cryptocurrency (esp. bitcoin) privacy & fungibility will be near the top of the discussions?
Come on, heads of state have been making sideways public comments at crypto for years, and now at crypto currencies... "damn swiss bank account on your phone". You have any idea how much lack of sleep this dilemma is causing them? Unfortunately rhetoric is getting stronger, like from that bitch May in the UK and the retirees in US Gov. Cryptos need to up their deployment and political game.
hobble currencies ... advantage investments ... achieve political ends
Sounds like cryptocurrencies job... already happening in some parts and directions.
participants (4)
-
Cecilia Tanaka
-
grarpamp
-
John Newman
-
Steve Kinney