[Webinar] Decrypting the WannaCry ransomware: Why is it happening and (how) is it going to end?

Steve Kinney admin at pilobilus.net
Thu May 18 10:32:29 PDT 2017



On 05/17/2017 07:25 PM, Cecilia Tanaka wrote:

>> The webinar tends to make an analysis of the main technological, geopolitical, legal, and economic
>> aspects of the ransomware. Experts from different fields will discuss
>> why ransomware has become a major issue: Can such attacks be prevented
>> by technological measures alone? Is there a need for a legal response,
>> such as Microsoft’s proposal for the Digital Geneva Convention? Is
>> raising more awareness among users the ultimate solution?
>>
>> The webinar will discuss whether it is possible to put a stop to
>> malicious software, or whether they should be considered the price we
>> have to pay for the many advantages of the Internet. Choices on policy
>> will have to be made sooner rather than later. The aim of the
>> discussion is to explore and help make informed policy choices.
>>
>> -----
>> Nancy Quiros
>> Development Manager LAC Chapters
> 
> Thank you for the clarification, Nancy!  Very much appreciated!  <3

*sigh*

The question "Can such attacks be prevented by technological measures
alone" has a very simple answer: Yes.  Just stop using Microsoft
operating systems and the problem goes away.

Microsoft could fix their horribly broken product any time, but they
never will:  Maintaining the highest rates of failure, repair and
replacement the market will bear creates a large revenue stream that
would not otherwise exist.  Security failure is the best approach:
Loyal Microsoft customers attribute the damage done to malicious third
parties, and the process of repairing that damage creates a
multi-million dollar bump in annual sales for Microsoft.

There will always be "security issues" in networked computing.  But at
least 95% of real world lost time and lost data incidents observed today
have a single and easily remedied cause:  Microsoft.

Mr. Miyagi say, "Best block is no be there."  In the case at hand,
that's the only block that really works.  Microsoft security fail
imposes either a large amount of busy work and extra costs on the user,
or exposes the user to unacceptable risks.  That's a lose/lose
situation, whether one is a Security Guru or clueless user.

Now let's see who jumps in to defend Microsoft:  There's always somebody
out there who believes that "stupid people get what they deserve" and
makes a business model out of that.

:o/






-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 490 bytes
Desc: OpenPGP digital signature
URL: <http://lists.cpunks.org/pipermail/cypherpunks/attachments/20170518/b48a5a22/attachment.sig>


More information about the cypherpunks mailing list