med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

413
active users

#bootkits

0 posts0 participants0 posts today
Replied in thread

@bedast My problem is that these people refuse to take the correct consequences and migrate away from garbage:

  1. You just don't install such garbage on #Unix-esque Systems like #Linux!

  2. #CrowdStrike is just yet another #Scareware #Scam.

  3. The entire business model of #AntiVirus and other Scareware shouldn't exist to begin with.

  4. 3rd party #BinaryBlobs on a non-#FLOSS'd kernel are just bad!

  5. It should be #Microsoft's sole tesponsibility to just not allow #Rootkits / #Bootkits like that to exist eith their blessing aka. #Signature on.

  6. #Windows & #WindowsServer are unbelieveably #cursed and unmaintainable mess that'll make even #Solaris 7 look clean and sleek.

  7. The diversity of Linux and Unix-esque distros like #BSD's make it basically impossible to bmhave such a giant and direct effect.

  8. The whole issue should've been avoided throug extensive testing because it's certainly so rampant that it would've been picked up by #QA testers.

  9. The fuckedup-ness of #CensorBoot aka. "#SecureBoot" (which is insecure af - see #GoldenKeyBoot!) is the reason why this results in such catastrophic failures, whereas on #Linux one just uses #LUKS and can easily recover files.

  10. Most Windows users & -#sysadmins neglect #Backups of Windows machines because there is no good way to backup them!

  11. 3rd party kernel binaryblobs are #malware, regardless if "Anti-Malware" or "#AntiCheat" is the claimed functionality.

  12. If I don't trust #WindowsDefender then I don't trust Windows or rather Microsoft and thus have to cease using it!

  13. This shit would not have been possible under Linux!

Nondeterministic ComputerMatthew Garrett (@mjg59@nondeterministic.computer)"Linux would have prevented this!" literally true because my former colleague KP Singh wrote a kernel security module that lets EDR implementations load ebpf into the kernel to monitor and act on security hooks and Crowdstrike now uses that rather than requiring its own kernel module that would otherwise absolutely have allowed this to happen, so everyone please say thank you to him

The #LogoFail #UEFI #exploit is a perfect example of how capitalism fucks everything up. So many people worked so hard on securing UEFI against #bootkits but having a goddamn image load was necessary for capitalist "intellectual property" to be enforced, thus opening this vulnerability for literally every Windows and Linux system with a hardware manufacturer logo loading in boot, which is most of them. arstechnica.com/security/2023/

This isn't a security fail, it's a #capitalism fail, because the social/legal regime of #intellectualproperty is actually unnecessary and oppressive, and in this case prevented people from designing secure systems.

Ars Technica · Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attackUEFIs booting Windows and Linux devices can be hacked by malicious logo images.