LockBit
Listen now
Description
This week we talk about virtual reality, the Meta Quest, and the Apple Vision Pro. We also discuss augmented reality, Magic Leap, and the iPhone. Recommended Book: Daemon by Daniel Suarez Transcript Ransomware is a sub-type of malware, which is malicious software that prevents its victim from accessing their data. So that might mean keeping them from logging into their cloud storage, but it might also mean encrypting their data so that there's no way to access it, ever again, unless they have the necessary decryptor, which is a piece of software or sometimes just a key that allows for the decryption of that encrypted, that locked-down data. The specifics of all this, though, are often less important than the practical reality of it. If you're attacked by a ransomware gang or hacker, your stuff, maybe your personal files, maybe your business files, all your customer information, your valuable trade secrets, anything that's stored digitally, might be completely inaccessible to you, and possibly even prone to deletion, though that might not even be necessary since strong encryption is essentially the same thing as deletion, for most intents and purposes; but all that data is gone, held hostage until and unless you pay some kind of ransom to the person or group that encrypted it, and which holds the key to its decryption. Most ransomware software is transmitted to its victims' computers via a trojan, which is a kind of malware that seems like real-deal software that you actually want or need to install, and folks are generally tricked into downloading and installing it because of that presumed legitimacy. So maybe you receive what looks like a software update for a tool you use at work, and it turns out the update was faked and what you installed was actually a trojan that installed malware on your computer, and consequently on your network, instead. Or maybe you pirated some software, and alongside the fake copy of Photoshop you installed, a trojan also carried another snippet of code that then, in the background, when your computer was hooked up to the internet, downloaded malware that looked for private data and encrypted it. At some point after ransomware is delivered and installed, your data successfully encrypted and inaccessible, you'll receive the ransom demand. For a while this was kind of an ad hoc thing, in some cases targeting people randomly on early internet usenet groups, in others big companies and other wealthy entities being specifically targeted and then ransomware teams calling or emailing or texting them directly, because they knew who they were hitting. In recent years, this has become a more distributed and mainstream effort, akin to an, organized business, and that mainstreamification was partially enabled by the dawn of crypto-currencies like Bitcoin, which allow for relatively anonymous transactions with strangers, and the development of ransomware that is self-contained, in that it can install itself, find the right, valuable files, and then demand a ransom from its victim, providing that victim with the proper bitcoin wallet or other crypto-banking system into which they need to deposit a fixed amount of money in that less-trackable digital currency. The software can then, still autonomously, either decrypt the files once the ransom is paid, or delete the files, killing them off forever, if the ransom isn't paid by an established deadline. Other variations on this theme exist, and some ransomware doesn't use encryption as a motivator to pay, but instead locks down users' machines, displays some kind of demand for money, purporting to be a government agency (or lying about having encrypted or stolen something of value), or it threatens to install illegal pornographic images of minors on the victims' machine if they don't pay the ransom. By far the most popular approach to ransomware, today, though, is encryption-based, and recent evolutions in the business model backing ransomware has escalated its us
More Episodes
This week we talk about neural networks, AGI, and scaling laws. We also discuss training data, user acquisition, and energy consumption. Recommended Book: Through the Grapevine by Taylor N. Carlson Transcript Depending on whose numbers you use, and which industries and types of investment those...
Published 11/19/24
Published 11/19/24
This week we talk about the Double Reduction Policy, gaokao, and Chegg. We also discuss GPTs, cheating, and disruption. Recommended Book: Autocracy, Inc by Anne Applebaum Transcript In July of 2021, the Chinese government implemented a new education rule called the Double Reduction Policy. This...
Published 11/12/24