-
-
- 1 more reply
New conversation -
-
-
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Begs the Q: If CIA/NSA created (or purchased) this malwear, did they know/remember the "
#kill_switch ? If so, why did (didnot) they use it? -
This!!!!!^^^^^^^^ cause they wanted it to happen!!!!!
End of conversation
New conversation -
-
-
Wouldn't the cia have known how to kill its own tool?
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
I smell a rat. What are the odds that this "researcher" just accidentally "stumbled upon" a nonsensical domain name; *AND* it was not taken?
-
he knew the domain from analyzing the malware.
-
"hard coded" domain in malware, and yet the author didn't' register it? Sure.
-
Yes. The whole article explain why the malware checks for an unregistered domain (spoiler: it has to do with sandboxes).
-
The unregistered domain is NOT a killer switch, but rather a way to check if DNS is faked (by e.g. a sandbox) or not.
End of conversation
New conversation -
-
-
It's not accidental actually: https://www.malwaretech.com/2017/05/how-to-accidentally-stop-a-global-cyber-attacks.html …
- 1 more reply
New conversation -
-
-
Most the people that could have helped are in jail, court or like yourself, forced away
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
- 1 more reply
New conversation -
-
Spy agencies put this crud out there and criminals run with it.
- 1 more reply
New conversation -
-
-
#WannaCry demonstrates dirty policies from fu&! gringos.Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Another practice scenario 4 peeps making gov. obsolete by discovering they can solve problems themselves. Oooh, careful Muricans! Communism!
- 1 more reply
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

