- Jun 10, 2017
- 11,571
- 17,751
Because it's all that can be done, trying to deter them enough. Exactly like with software.Took time to understand it: they're not a solution, just a deterrent.
It's a bit more complicated. When you're a big company, you'll have a dozen of thousand computers to firstly isolate, then clean-up and reinstall. And obviously each cleaned up computer have to be kept far from the still compromised one, else they'll be compromised again. Even with a good IT team, you'll need a full week, if not more.Ransomware would not have spiked in attacks if everyone had made backups.
And sources that say the opposite, while neither ones, nor the others, can be blindly trusted. There's billions in play here, so it's in the interest of any competitors, and so their friends/investors, to say that ironSource did it intentionally. And in the interest of ironSource, and their friends/investors, to say the opposite.Well, in case of this specific company, there are sources that does not sustain this line of press. (Meaning: they were expecting it to work this way and hoped not get caught).
They knew they were working with fire, expecting a borderline technology to do marvels. That is sure. But did they really expected people to abuse it or not, we will probably never know for sure.
One can build an artisanal mortar-like technology to quickly spread seeds on a devastated land ; after a forest fire by example. It would works. A small explosive charge that explode at a given height, and the seeds are spread faster than humans could manually do. But well, one can then replace the seeds by nails and have a marvelous shrapnel engine. [Yeah, this is already possible, it's just an example]
The inventor can't really be blamed, but isn't innocent either ; he should have wondered that this was a possibility and added some securities to avoid it. I guess that ironSource is in this exact position.