Microsoft MS17-010 Telemetry Petition

To provide maximum transparency to Microsoft, we are confirming email addresses for petition signatures.  We will not provide Microsoft with your email address, but this step helps validate that large numbers of signatures were not simply submitted by some automated form submission.  You may need to check your spam folder to find your confirmation email.

Ask Microsoft to publish telemetry data about MS17-010

We the undersigned believe that Microsoft should release any and all anonymized telemetry data they possess relating to the exploitation of the vulnerabilities patched in MS17-010. We believe that Microsoft has a duty to the public to release this data to further the public's understanding of the historic Shadow Brokers event. We believe that failure to release this data inhibits the public from constructing the best defenses against future vulnerabilities that will inevitably be discovered in Microsoft's own products. We urge Microsoft to immediately make anonymized telemetry data available for public analysis or failing that to publish the results of their own internal analysis, answering questions including (but not limited to):

1. Did Microsoft discover the vulnerabilities patched in MS17-010 or were they notified of the vulnerabilities by a third-party? If reported by a third-party, which third-party organization reported the vulnerabilities?
2. When was Microsoft first aware of the vulnerabilities patched in MS17-010?
3. Does Microsoft telemetry indicate that the vulnerabilities in MS17-010 were exploited in the wild prior to the Shadow Brokers release of the tools on April 14, 2017?
4. If telemetry shows that these vulnerabilities were exploited, is the exploitation consistent with one hacking group or multiple hacking groups?
5. If telemetry shows that these vulnerabilities were exploited, did the rate of exploitation accelerate after the first appearance of the Shadow Brokers in 2016?
6. If telemetry shows that these vulnerabilities were exploited, did the rate of exploitation accelerate after the dump of exploit file names on January 8, 2017?

Sincerely...

[signature]

65 signatures

Share this with your friends:

   

 

Signature List:

Latest Signatures
65 James S. May 23, 2017
64 Dale H. May 23, 2017
63 Janith M. May 19, 2017
62 Adam G. May 18, 2017
61 Fabian G. May 17, 2017
60 Ray M. May 17, 2017
59 Akhilan S. May 17, 2017
58 Casey B. May 17, 2017
57 ryan s. May 17, 2017
56 Ricardo M. May 16, 2017
55 Michael H. May 16, 2017
54 Lyle B. May 16, 2017
53 Chris W. May 16, 2017
52 Fred S. May 16, 2017
51 Eric W. May 16, 2017
50 Alfredo C. May 16, 2017
49 Chad P. May 15, 2017
48 Matthew P. May 15, 2017
47 Roger S. May 15, 2017
46 Derek H. May 15, 2017
45 Christopher G. May 15, 2017
44 Carl H. May 15, 2017
43 Frank M. May 15, 2017
42 Mark K. May 15, 2017
41 Andrew S. May 15, 2017
40 Michael H. May 15, 2017
39 Mark B. May 15, 2017
38 Chris E. May 15, 2017
37 Michael M. May 15, 2017
36 Brian L. May 15, 2017
35 Samuel R. May 15, 2017
34 anthony h. May 15, 2017
33 Todd P. May 15, 2017
32 Matthew L. May 15, 2017
31 Michael R. May 15, 2017
30 Chris E. May 14, 2017
29 Boris E. May 14, 2017
28 Kris C. May 13, 2017
27 Wilco S. May 13, 2017
26 Jason T. May 13, 2017
25 John B. May 13, 2017
24 Peter B. May 12, 2017
23 Dan B. May 12, 2017
22 Aaron W. May 12, 2017
21 Shawn G. May 12, 2017
20 Del T. May 10, 2017
19 Michael H. May 09, 2017
18 Albert Z. May 09, 2017
17 Norman A. May 09, 2017
16 Matt K. May 09, 2017