Win 11 system requirements and compatibility talk

Started 4 months ago | Discussions thread
abelits
abelits Contributing Member • Posts: 810
Re: Will security requirements help with ransomware protection?

Billiam29 wrote:

abelits wrote:

Sean Nelson wrote:

In an world of online forums, it wouldn't take all that long for the community to find the correlation between what signed program was installed across systems that corresponded to incidents.

That would require a very large number of people with and also very large number of people without a given program reliably determining success of a particular exploit. It does not work.

You already see that with unsigned software.

At best, it could find blatant and obvious trojan horse programs. Could because it worked when it was unheard of for legitimate software to perform anything invasive or communicate with the vendor, so trojans stood out like sore thumbs.

For vulnerabilities it never worked. They are all either published by their authors or found by proactive testing, or by observation of exploits in the wild.

I floated this idea specifically as a hypothetical means for an OS to counter ransomware which is what the subject even still says for this sub-thread. Now it appears as if you’re arguing against it based on impracticalities for use combating general exploits and vulnerabilities. That’s not the context.

If you think such an idea is impractical to develop and implement solely for ransomware protection while not also protecting against other types of threats, that’s fine. I’m not getting that based on what you just said though. You appear to be making arguments against the idea based on items other than the idea’s specific intended purpose of ransomware protection.

Ransomware very, very rarely comes packaged under the guise of legitimate software, leave alone identifiable one. While it did happen recently, it may be years or decades before it will happen again at any scale that can be detected by amateurs of a forum, and even then professionals are going to be faster than that. Ransomware usually uses various vulnerabilities in client software (browsers, email readers, viewers of all kinds and libraries they use), and the user can not identify, which action or file resulted in its activation. Even when distributed using social engineering or as a part of software that is less than legitimate (say, license key generator for commercially distributed software), it's usually not specifically identifiable.

 abelits's gear list:abelits's gear list
Fujifilm X-Pro1 Fujifilm X-T2 Fujifilm XF 35mm F1.4 R Fujifilm XF 14mm F2.8 R Fujifilm XF 18-55mm F2.8-4 R LM OIS +16 more
Post (hide subjects) Posted by
MOD Austinian
MOD Austinian
MOD Austinian
MOD Austinian
MOD Austinian
MOD Austinian
MOD Austinian
MOD Austinian
MOD Austinian
MOD Austinian
MOD Austinian
MOD Austinian
MOD Austinian
MOD Austinian
MOD Austinian
MOD Austinian
MOD Austinian
MOD Austinian
MOD Austinian
MOD Austinian
MOD Austinian
Keyboard shortcuts:
FForum PPrevious NNext WNext unread UUpvote SSubscribe RReply QQuote BBookmark MMy threads
Color scheme? Blue / Yellow