

To categorically prevent that, every computer would need to centrally controlled and managed, which might have been the case here, and the system configuration has to prevent all software that’s not pre-approved from running.
That’s possible too, but could be a pain to tightly manage. It was a privileged user that was spear phished though… the kind of trusted user who might be able to install software on their machine without additional approval.











Imagine a beach of infinite length with one lemonade stand on it.
Where do you open a second lemonade stand to maximize sales if people will buy from the closet stand?
The answer: next to the first stand. Everyone to the left of your stand will find you are the best option and everyone to the right will choose the other.
This model explains why two political parties along a spectrum can end up not too different from each other in an attempt to capture the most votes.