1233
Malware As A Service (sh.itjust.works)
you are viewing a single comment's thread
view the rest of the comments
[-] aniki@lemmy.zip 20 points 1 year ago

ItS NoT A wInDoWs PrObLeM -- Idiots, even on Lemmy

[-] ricdeh@lemmy.world 43 points 1 year ago

I genuinely can't tell at whom you are addressing this. Those claiming it is a Windows problem or those that say otherwise?

[-] daellat@lemmy.world 25 points 1 year ago

Hi, idiot here. Can you explain how it is a windows problem?

[-] aniki@lemmy.zip 8 points 1 year ago* (last edited 1 year ago)

If you patch a security vulnerability, who's fault is the vulnerability? If the OS didn't suck, why does it need a 90 billion dollar operation to unfuck it?

Redhat is VALUED at less than that.

https://pitchbook.com/profiles/company/41182-21

It's a fucking windows problem.

[-] ricecake@sh.itjust.works 45 points 1 year ago* (last edited 1 year ago)

Sure, but they weren't patching a windows vulnerability, windows software, or a security issue, they were updating their software.

I'm all for blaming Microsoft for shit, but "third party software update causes boot problem" isn't exactly anything they caused or did.

You also missed that the same software is deployed on Mac and Linux hosts.

Hell, they specifically call out their redhat partnership: https://www.crowdstrike.com/partners/falcon-for-red-hat/

[-] xtr0n@sh.itjust.works 15 points 1 year ago

Crowdstrike completely screwed the pooch with this deploy but ideally, Windows wouldn’t get crashed by a bas 3rd party software update. Although, the crashes may be by design in a way. If you don’t want your machine running without the security software running, and if the security software is buggy and won’t start up, maybe the safest thing is to not start up?

[-] MangoPenguin 22 points 1 year ago

Are we acting like Linux couldn't have the same thing happen to it? There are plenty of things that can break boot.

CrowdStrike also supports Linux and if they fucked up a Windows patch, they could very well fuck up a linux one too. If they ever pushed a broken update on Linux endpoints, it could very well cause a kernel panic.

[-] ricecake@sh.itjust.works 13 points 1 year ago

Yeah, it's a crowd strike issue. The software is essentially a kernel module, and a borked kernel module will have a lot of opportunities to ruin stuff, regardless of the OS.

Ideally, you want your failure mode to be configurable, since things like hospitals would often rather a failure with the security system keep the medical record access available. :/. If they're to the point of touching system files, you're pretty close to "game over" for most security contexts unfortunately. Some fun things you can do with hardware encryption modules for some cases, but at that point you're limiting damage more than preventing a breach.

Architecture wise, the windows hybrid kernel model is potentially more stable in the face of the "bad kernel module" sort of thing since a driver or module can fail without taking out the rest of the system. In practice.... Not usually since your video card shiting the bed is gonna ruin your day regardless.

this post was submitted on 19 Jul 2024
1233 points (100.0% liked)

Programmer Humor

26799 readers
1353 users here now

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

founded 2 years ago
MODERATORS