[125788] in cryptography@c2.net mail archive
Re: Ransomware
daemon@ATHENA.MIT.EDU (Ilya Levin)
Wed Jun 11 10:32:54 2008
Date: Wed, 11 Jun 2008 12:47:16 +0800
From: "Ilya Levin" <ilevin@gmail.com>
To: Allen <netsecurity@sound-by-design.com>
Cc: "Leichter, Jerry" <leichter_jerrold@emc.com>, cryptography@metzdowd.com
In-Reply-To: <484ED16A.7060006@sound-by-design.com>
Allen <netsecurity@sound-by-design.com> wrote:
> Agreed, but..., well there is the small matter of figuring out /who/ is
> doing it and that just might require some small bit of technology.
Certainly, it is not mutual exclusive. However factor an RSA key
hardly can help with that.
> At least two defects in this thinking. A) How do we know *a* person did the
> coding? B) Who defines what is "illegal" code?
A) All the authorities ever need is always *a* person, and then they can do
the rest. In this particular case the *real* solution of the problem would be
trace the money dropper and bust the chain. The only required cryptanalysis
here is a thermo-rectal one.
B) It not about legal or illegal code, it is not about a code at all.
Blackmailing
for ransom is a crime and demanding a ransom for digital assets does not
make this any different. A crime must be addressed as a crime in a first place.
Ilya
--
http://www.literatecode.com
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com