NYT Tries to Blame Microsoft for WannaCry

Andrew Anglin
Daily Stormer
May 15, 2017

Okay so all mainstream media is basically government propaganda, because the same Jews that run the government run almost all media.

But some is more extreme than others.

“The New York Times” is the most extreme of the legacy media, “The Verge” is among the most extreme of the new media.

While Putin is telling the Truth, and saying that WannaCry is the fault of the NSA – and most Western media is being forced to agree with him – New York Times, backed up by The Verge, is trying to blame Microsoft.

Their reasoning?

Microsoft should be forced to chronically update old software, in order to make up for user irresponsibility.

The Verge:

Friday saw the largest global ransomware attack in internet history, and the world did not handle it well. We’re only beginning to calculate the damage inflicted by the WannaCry program — in both dollars and lives lost from hospital downtime — but at the same time, we’re also calculating blame.

There’s a long list of parties responsible, including the criminals, the NSA, and the victims themselves — but the most controversial has been Microsoft itself. The attack exploited a Windows networking protocol to spread within networks, and while Microsoft released a patch nearly two months ago, it’s become painfully clear that patch didn’t reach all users. Microsoft was following the best practices for security and still left hundreds of thousands of computers vulnerable, with dire consequences. Was it good enough?

For some, the answer is an obvious no. Writing in The New York Times over the weekend, sociologist Zeynep Tufecki placed the blame squarely on Microsoft for its decision to stop supporting older Windows versions. “Companies like Microsoft should discard the idea that they can abandon people using older software,” Tufecki wrote. “Industry norms are lousy to horrible, and it is reasonable to expect a company with a dominant market position, that made so much money selling software that runs critical infrastructure, to do more.”

ZDNet was even harsher. “The real problem here is that for decades the IT industry as a whole has been selling rubbish products,” a post argued. “It’s become fabulously wealthy by making products that are broken to begin with, and often, directly or indirectly, charging customers to fix them.”

The core of the issue is Microsoft’s tiered support system. The vulnerability targeted last week doesn’t exist in systems released since Windows 8 (which introduced SMBv3), so the main targets were Windows 7 and Windows XP. Windows 7 users are still receiving patches, but XP has been unsupported since April 2014. Users can still pay for updates through Microsoft’s Custom Support service, but the company isn’t deploying patches publicly, even though the system is still widely used in Africa and Asia. The company published an emergency XP patch over the weekend to protect against the ransomware, but it was too late for NHS and countless other victims.

That may sound technical, but the upshot is simple: there are still millions of computers using Windows XP, and without custom support, they’re all vulnerable — not just to this latest ransomware, but to dozens of other vulnerabilities unearthed in the last three years. They’re easy prey for botnets, spyware, and dozens of other criminal schemes, a persistent problem for anyone trying to secure the web.

I’m the Mike Tyson of analogies, and I’m struggling here.

Hold on a second…

Okay, this will do:

There is a deadly new venereal disease on the loose, which was created by the government as a bioweapon, but somehow got out on the loose. You can get it while using a condom, if you don’t get a special new kind (which has already existed and been exclusively sold in stores for a decade). The condom company announces to everyone that this disease is dangerous, you have to watch out, and use the new condoms instead of ones 10 years old. They they go and try to pass out the new condoms to everyone. They set up stations on every street corner to pass out these new condoms. Then you have sex with a skank from the bar with one of your 10 year old condoms you’ve been saving for some reason, get the disease, and blame the condom company.

Wow, okay, not great. Not my best.

But you get the point here, no?

Look, I never thought I would be defending Microsoft, ever, but saying that they are responsible to force you to upgrade software that was released in 2001 and which stopped receiving updates in 2008 is insane.

And the reason that the NYT and their new media lackeys like The Verge and ZDNet are pushing this is to protect the responsible parties, which are the NSA and the companies and individuals who rely on old software, because they are lazy or too stupid to be using computers in the first place.

In other WannaCry news, the “authorities” are on the hunt.


Authorities are on the hunt for those behind the Wannacry ransomware — the largest ransomware attack there’s ever been.

Organisations across the globe were crippled by a ransomware attack which claimed more than 200,000 victims in over 150 countries, including the UK’s National Health Service and businesses and government institutions in Russia, China and the US.

PCs which become infected by the ransomware are locked and users are issued with a ransom $300 in Bitcoin for unencrypting their files. That doubles to $600 if the demand isn’t met within three days and if a week goes by without payment the victims are threatened that their files could be deleted forever.

While organisations are slowly returning to normal in the aftermath of the weekend’s attacks, investigators and law enforcement are looking into the attack in an effort to identify the perpetrators.

“We’re trawling through huge amounts of data associated with the attack and identifying patterns,” said Lynne Owens, Director General of the National Crime Agency, the UK’s organised crime fighting taskforce.

The NCA is working alongside international law enforcement partners including Europol, Interpol and the FBI to investigate the attacks.

“We are actively sharing information related to this event and stand ready to lend technical support and assistance as needed to our partners, both in the United States and internationally. DHS has a cadre of cybersecurity professionals that can provide expertise and support to critical infrastructure entities,” the Department of Homeland Security said in a statement.

But the sheer number of infections across the globe and the fact the attackers rely on anonymous Bitcoin payments to receive ransoms means they’re going to be hard to track down.

The attackers have also only made around $50,000 in ransom demands so far, indicating that the vast majority of victims simply aren’t paying up.

I find that rather hard to believe.

If that’s the real number (and they might be able to trace that, but they’re not giving a source), then it’s because people are trying to figure out how to use Bitcoin. Or because people are stupid enough to think the government is somehow going to give them a “cure” for it – I can sort of see how the announcement that “Microsoft released a patch” could say to non-techie people that they released a “cure.”

BUT – maybe people just don’t keep much on their PCs anymore? I guess most stuff is stored online.

“Because of the quantity of data involved and the complexity of these kinds of enquiries we need to be clear that this is an investigation which will take time,” said Owens.

“But I want to reassure the public that investigators are working round the clock to secure evidence and have begun to forensically analyse a number of infected computers,” she added.

There’s pretty well no way in hell they’re going to catch anyone.

I’m not a tech expert. But I’m pretty sure if there was any chance for the guy to get caught, he would have done it on a much, much smaller scale, and thus not triggered the international manhunt.

And it’s also impossible to trace.

I’m a wee bit surprised they haven’t blamed THE KGB yet. Maybe they’re catching on to the fact that people are catching on to how absurd this “Russia did everything” narrative is?

Current WannaCry situation map