Ranter
Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Comments
-
@runfrodorun well who else would you blame ? Government knew about them but didn't say anything. They're in fault.
-
In the end, the biggest fault lies with the users as they neglected to update their system with the latest security updates.
-
@ParkCity Total BS. They patched it in march for current products. Of course if you run an EOL product you had no patch. Microsoft has created a patch afterwards for XP and server 2003. I mean.. No company can ever maintain EVERY product they have created.
-
PacRat40227y@JerreMuesli Wannacry is the product of leaked nsa spyware, is a worm, and can be executed by simply following a link online - it's not some virus you can protect your stuff from by simply product software/firmware; it also utilizes the spyware backdoors that windows has installed to run its course
-
@ParkCity what fucking spyware backdoors? The problem is a bug in the implementation of the SMBv1 protocol. That is a protocol from the fucking 80's which shouldn't even be active so get your God damn fucking facts straight before you start bashing.
Oh, Microsoft recommended to disable SMB v1 in September 2016 (https://blogs.technet.microsoft.com/...) -
PacRat40227y@dsteiner i'm referring to the backdoors in windows 10, which microsoft openly admitted were there
-
PacRat40227y@dsteiner
Windows 10 needs backdoor/rear entry methods to collect any of that "Private data" that people are so hyped up about now. Wannacry goes through that same backdoor to execute itself on your system.
1- http://21stcenturywire.com/2015/11/...
2- https://techworm.net/2014/10/...
i'd be happy to look for more if need be -
This is not a backdoor this is a way to collect telemetry data crashdumps and analytics data. And no, wanna cry does not use this channel as this is a one-way road to Microsoft. Wannacry replicates itself via the smbv1 protocol as just said.
This is pretty much the same as an osd interface at a car - a way to get information about your PC if something gets wrong. -
31415177yIn my experience, many of those unpatched systems are the result of Microsoft's vendor/product lock-in "features" backfiring.
-
@runfrodorun The reason behind why viruses are mostly targeted towards Windows system is because Windows runs on the majority of computers out there. When a terrorist wants to deal maximum damage, he blows up a church on sunday, not an abandonded warehouse.
Related Rants
Has anyone read the latest rant from Microsoft?
https://blogs.microsoft.com/on-the-...
<<Finally, this attack provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem. This is an emerging pattern in 2017. We have seen vulnerabilities stored by the CIA show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world. Repeatedly, exploits in the hands of governments have leaked into the public domain and caused widespread damage.>>
undefined
cia
microsoft
nsa
ransomware