zimtech
New Member
- Reaction score
- 0
- Location
- Zimmerman MN
This method of locking files is effective in scamming people. I doubt it will go away, the vector will just change to deliver the payload. As we have seen, the target for the payload (of locking) will change too.
Do you think that the take over of computers/networks that hold the keys will be a common way to handle this cat and mouse game from now on?
Given that the keys have been once retrieved, other attacks this way might also have their keys retrieved. Its it ever ethical to wipe the data if it is possibility recoverable in a future date?
Practicality might be a different issue. Some people who had their data stored encrypted could have that data encrypted now.
Do you think that the take over of computers/networks that hold the keys will be a common way to handle this cat and mouse game from now on?
Given that the keys have been once retrieved, other attacks this way might also have their keys retrieved. Its it ever ethical to wipe the data if it is possibility recoverable in a future date?
Practicality might be a different issue. Some people who had their data stored encrypted could have that data encrypted now.