Hacker News new | past | comments | ask | show | jobs | submit login

This variant seems to - it needs the command and control servers to get the public key.

Particularly evil malware could probably encrypt the data irreversibly if the command and control servers were unavailable, since as long as the decryption works some portion of the time lots of people will pay, but thankfully this particular example doesn't seem to be there yet.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: