Has anyone read the latest rant from Microsoft?


<<Finally, this attack provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem. This is an emerging pattern in 2017. We have seen vulnerabilities stored by the CIA show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world. Repeatedly, exploits in the hands of governments have leaked into the public domain and caused widespread damage.>>

  • 2
    @runfrodorun well who else would you blame ? Government knew about them but didn't say anything. They're in fault.
  • 3
    In the end, the biggest fault lies with the users as they neglected to update their system with the latest security updates.
  • 1
    @JerreMuesli you mean the updates microsoft pushed AFTER wannacry broke out
  • 1
    @ParkCity Total BS. They patched it in march for current products. Of course if you run an EOL product you had no patch. Microsoft has created a patch afterwards for XP and server 2003. I mean.. No company can ever maintain EVERY product they have created.
  • 0
    @JerreMuesli Wannacry is the product of leaked nsa spyware, is a worm, and can be executed by simply following a link online - it's not some virus you can protect your stuff from by simply product software/firmware; it also utilizes the spyware backdoors that windows has installed to run its course
  • 1
    @ParkCity what fucking spyware backdoors? The problem is a bug in the implementation of the SMBv1 protocol. That is a protocol from the fucking 80's which shouldn't even be active so get your God damn fucking facts straight before you start bashing.

    Oh, Microsoft recommended to disable SMB v1 in September 2016 (https://blogs.technet.microsoft.com/...)
  • 0
    @dsteiner i'm referring to the backdoors in windows 10, which microsoft openly admitted were there
  • 0
    @ParkCity link or didn't happen.
  • 0
    Windows 10 needs backdoor/rear entry methods to collect any of that "Private data" that people are so hyped up about now. Wannacry goes through that same backdoor to execute itself on your system.

    1- http://21stcenturywire.com/2015/11/...

    2- https://techworm.net/2014/10/...

    i'd be happy to look for more if need be
  • 0
    This is not a backdoor this is a way to collect telemetry data crashdumps and analytics data. And no, wanna cry does not use this channel as this is a one-way road to Microsoft. Wannacry replicates itself via the smbv1 protocol as just said.

    This is pretty much the same as an osd interface at a car - a way to get information about your PC if something gets wrong.
  • 0
    In my experience, many of those unpatched systems are the result of Microsoft's vendor/product lock-in "features" backfiring.
  • 1
    @runfrodorun The reason behind why viruses are mostly targeted towards Windows system is because Windows runs on the majority of computers out there. When a terrorist wants to deal maximum damage, he blows up a church on sunday, not an abandonded warehouse.
Add Comment