CrowdStrike effectively bricked windows, Mac and Linux today.

Windows machines won’t boot, and Mac and Linux work is abandoned because all their users are on twitter making memes.

Incredible work.

          • rockSlayer@lemmy.world
            link
            fedilink
            arrow-up
            13
            ·
            4 months ago

            What if that someone is another toddler that found the gun in the street, and it got in the street because it fell off a truck? Your Honor, what if the toddler had murderous intent because they were denied a sucker?

          • jedibob5@lemmy.world
            link
            fedilink
            English
            arrow-up
            8
            ·
            4 months ago

            Is this implying that a publicly-traded corporation whose software is installed on millions of computers around the world has the same level of agency and responsibility as a preschooler?

            I mean, yes, Microsoft bears responsibility for blindly accepting whatever deployment package CrowdStrike gave it and immediately yeeting it out to 100% of customers via Windows Update without any kind of validation or incremental rollout, and should probably be sued for it. That still doesn’t negate the complete and catastrophic failures at every step of the development process on the part of CrowdStrike. It takes a lot of people to fuck up this bad.

              • peopleproblems@lemmy.world
                link
                fedilink
                arrow-up
                9
                ·
                4 months ago

                That’s the impressive part of all this. Microsoft didn’t do it. CloudStrike did it.

                Microsoft left something in a state that allowed CloudStrike to fuck up enough to brick systems.

                It’s why we spend a lot of time reviewing security analysis of our own software - if there’s a way to fuck everything up, it better not because we enabled it to get fucked.

            • Justin@lemmy.jlh.name
              link
              fedilink
              English
              arrow-up
              6
              ·
              4 months ago

              Is this implying that a publicly-traded corporation whose software is installed on millions of computers around the world has the same level of agency and responsibility as a preschooler?

              When it comes to IT reliability and security, kinda, yeah.

              Windows AV and MDM is a bit of a horror show in the corporate space. I worked somewhere where developers weren’t allowed to use WSL because it was blocked by McAfee. We also had 3 different MDMs running and they were slow as balls even though they were modern 8 core laptops.

      • tibi@lemmy.world
        link
        fedilink
        arrow-up
        7
        ·
        4 months ago

        It’s not Microsoft’s fault a third party company wrote a kernel module that crashes the OS.

        Unlike the mobile world where apps are severely limited and sandboxed, the desktop is completely the opposite. Microsoft has tried many times to limit what programs can do, but encountered a lot of resistance and ultimately had to let it go.

        • Justin@lemmy.jlh.name
          link
          fedilink
          English
          arrow-up
          3
          ·
          edit-2
          4 months ago

          Windows requires that antuviruses run at kernel level, programs which are notoriously buggy and harmful. It is a design flaw to require users to implement mandatory security features in this way. (it is literally not possible to run windows 10 or 11 without an antivirus) Similar security programs on Linux do not run at kernel level, nor should they.

          Furthermore, every copy of Windows since Windows 7 requires that kernel modules are signed by Microsoft themselves. Microsoft personally signed off on this code that crashed millions of computers.

          • tibi@lemmy.world
            link
            fedilink
            arrow-up
            6
            ·
            4 months ago

            Antivirus software for Linux also has kernel access. You can’t intercept OS operations like opening files or launching executables without kernel access. And some of the companies I worked at also required antivirus software on Linux servers.

            You can absolutely run Windows without an anti-virus, it has plenty of security features built-in.

            It’s all a matter of trust. Do you trust your engineers to properly configure machines to be secure and not run exes from dubious sources, or do you trust a cybersecurity company to do it for you? Anti-virus software nowadays is more about restricting users from doing stupid shit.

          • tibi@lemmy.world
            link
            fedilink
            arrow-up
            5
            ·
            4 months ago

            Oh, and signed drivers aren’t about Microsoft validating and testing every driver. It’s about verifying that the driver comes from a trusted company and isn’t tampered with.

    • smb@lemmy.ml
      link
      fedilink
      English
      arrow-up
      1
      ·
      4 months ago

      well maybe letting them pay compensation to all(!) victims (not just their customers) for all losses including lost time already would solve that problem.

      that would leave the decades-long unsolved problem of microsoft not beeing held liable for their buggy products (which is the reason for all security-products-as-a-workaround-to-compensate-that-crappy-os companies existance) open.

      why not in general hold companies liable for the damage they cause so they CAN develop beeing more cautious with what they do? i mean not ONLY cs should be sued to hell, but ALL of them should be sued until they are reasonable cautious with all possible damages they can cause (and already did in the past)