[Webinar] Decrypting the WannaCry ransomware: Why is it happening and (how) is it going to end?

John Newman jnn at synfin.org
Thu May 18 13:36:10 PDT 2017

> On May 18, 2017, at 1:32 PM, Steve Kinney <admin at pilobilus.net> wrote:
> On 05/17/2017 07:25 PM, Cecilia Tanaka wrote:
>>> The webinar tends to make an analysis of the main technological, geopolitical, legal, and economic
>>> aspects of the ransomware. Experts from different fields will discuss
>>> why ransomware has become a major issue: Can such attacks be prevented
>>> by technological measures alone? Is there a need for a legal response,
>>> such as Microsoft’s proposal for the Digital Geneva Convention? Is
>>> raising more awareness among users the ultimate solution?
>>> The webinar will discuss whether it is possible to put a stop to
>>> malicious software, or whether they should be considered the price we
>>> have to pay for the many advantages of the Internet. Choices on policy
>>> will have to be made sooner rather than later. The aim of the
>>> discussion is to explore and help make informed policy choices.
>>> -----
>>> Nancy Quiros
>>> Development Manager LAC Chapters
>> Thank you for the clarification, Nancy!  Very much appreciated!  <3
> *sigh*
> The question "Can such attacks be prevented by technological measures
> alone" has a very simple answer: Yes.  Just stop using Microsoft
> operating systems and the problem goes away.
> Microsoft could fix their horribly broken product any time, but they
> never will:  Maintaining the highest rates of failure, repair and
> replacement the market will bear creates a large revenue stream that
> would not otherwise exist.  Security failure is the best approach:
> Loyal Microsoft customers attribute the damage done to malicious third
> parties, and the process of repairing that damage creates a
> multi-million dollar bump in annual sales for Microsoft.
> There will always be "security issues" in networked computing.  But at
> least 95% of real world lost time and lost data incidents observed today
> have a single and easily remedied cause:  Microsoft.
> Mr. Miyagi say, "Best block is no be there."  In the case at hand,
> that's the only block that really works.  Microsoft security fail
> imposes either a large amount of busy work and extra costs on the user,
> or exposes the user to unacceptable risks.  That's a lose/lose
> situation, whether one is a Security Guru or clueless user.
> Now let's see who jumps in to defend Microsoft:  There's always somebody
> out there who believes that "stupid people get what they deserve" and
> makes a business model out of that.
> :o/

Microsoft is ALWAYS what causes problems during pentest season.. fucking pass-the-hash, llmnr, and other broken by design protocols that have been giving script kiddies the SAME pivot points (and entry points!) for nearly 20 years...


More information about the cypherpunks mailing list