
You’re welcome. It was a pleasure to set someomes ideas about Mr Gates right.

You’re welcome. It was a pleasure to set someomes ideas about Mr Gates right.

Encryption alone won’t prevent ransomware to encrypt it again. The original files need to be readable after all, so they are either unencrypted at boot or appear unencrypted to the (infected) client by machine/session key management. Nevertheless, adding an addittional, "“hostile” encryption layer will make them unreadable. The reasonable thing would be not to use a monocultural, standard setup that is known to be vulnerable to that kind of attack and first of all to get rid of fucking Outlook which has always been a dumpster fire.

Wikipedia for a beginning: https://en.wikipedia.org/wiki/Standardization_of_Office_Open_XML I remember The Register having a more detailed (and pretty snarky) article about it back then, but I didn’t search for it yet.

Let me assure you that the original board that was voting for Open Office’s proposal was absolutely pissed off, short of dissolving but eventually unable to revert the decision because of it’s formal correctness.

…and bribed the represenatives of the “new” IETF members as well as their governments to vote for Microsoft’s standard. The latter was, of course, a matter strictly between “business partners” and probably barred behind NDAs, so “legal” as long as nobody would blow the wistle.

Ransomware attack are successful mostly against MS Active Directory and Ourlook based setups.

Cool. Endlich ein Font, den niemand lesen kann. Spart mir das Gehampel mit PGP. Nachteil: ich kann meine Handschrift selbst nicht lesen, :-(

There are some people who míght learn from a ransomware attack. Only if it personally hits them, of course.

“bribed” is a gross simplifiction of the almost hilariously evil plot they pulled to get OOXML certified. They actually bribed a couple of smaller nation states to become IETF members and vote for Microsoft’s standard. It was a major scandal back in the day but formally legal.

This sound so horrible, I might finally “upgrade” to 11.
Usually the common vulnerability is a combination of Outlook and Active Directory. Outlook will happily execute whatever users click upon and AD lets them steal their credentials, to simplify things.