aka "it's a good idea to turn our productivity software into ransomware" plan
Isn't that just the Oracle method?
Isn't that just the Oracle method?