This archive is retained to ensure existing URLs remain functional. It will not contain any emails sent to this mailing list after July 1, 2024. For all messages, including those sent before and after this date, please visit the new location of the archive at https://mailman.ripe.net/archives/list/cooperation-wg@ripe.net/
[cooperation-wg] WannaCry Ransomware
- Previous message (by thread): [cooperation-wg] WannaCry Ransomware
- Next message (by thread): [cooperation-wg] New IPv6 Support for Governments Programme
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Michele Neylon - Blacknight
michele at blacknight.com
Tue May 23 12:32:44 CEST 2017
Gordon 100% agree with you on all points. Regards Michele -- Mr Michele Neylon Blacknight Solutions Hosting, Colocation & Domains https://www.blacknight.com/ http://blacknight.blog/ Intl. +353 (0) 59 9183072 Direct Dial: +353 (0)59 9183090 Personal blog: https://michele.blog/ Some thoughts: https://ceo.hosting/ ------------------------------- Blacknight Internet Solutions Ltd, Unit 12A,Barrowside Business Park,Sleaty Road,Graiguecullen,Carlow,R93 X265,Ireland Company No.: 370845 On 15/05/2017, 12:59, "cooperation-wg on behalf of Gordon Lennox" <cooperation-wg-bounces at ripe.net on behalf of gordon.lennox.13 at gmail.com> wrote: Thanks Richard for distributing this. However I am sure everybody else on this list had already checked their favourite sources of information well before this was sent out. Europol has to be much faster. “a critical exploit in a popular communication protocol used by Windows systems”? OK again people here know what was going on: it was not the protocol but the implementation. If Europol is going to address the wider public then they have to use simpler, cleaner language. Anyway what Europol omits to even hint at is that this bit of poor programming from Microsoft was known to certain government agencies from way back. And they tried to kept secret so they could use it themselves? We need a better discussion about this. Access providers are being asked to carry out user surveillance / logging on behalf of LEAs. Meanwhile the IETF is encouraging encryption while government ministers are trying to discourage encryption. Meanwhile governments know where common systems are vulnerable and yet neither tell the public nor protect the public. Gordon > On 15 May 2017, at 07:57, Richard Leaning <rleaning at ripe.net> wrote: > > Dear Colleagues, > > The European cybercrime centre at Europol have asked us to circulate the below. I hope you find it useful and please forward it on to anyone who you may think will benefit from it. > > Kind regards > > Richard Leaning > External Relations > RIPE NCC > > > ///snip
- Previous message (by thread): [cooperation-wg] WannaCry Ransomware
- Next message (by thread): [cooperation-wg] New IPv6 Support for Governments Programme
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]